Top Stories

Track Your Kids with FiLIP - the Smarwatch for Kids

Track Your Kids with FiLIP - the Smarwatch for Kids

These days, you’ll think nothing of kids below 10 years old tapping on a smartphone.  It’s not their parent’s smartphone, it’s their very own smartphone.  Some see nothing wrong with this as it helps the parents keep tabs on their kids, but on the downside it might make them more interested in playing games on their phones instead of actually engaging in physical activities. For those who don’t see smartphones as the answer to keeping tabs on their kids, then they might consider the FiLIP. FiLIP is a smartwatch directed at kids aged 4 to 11.  This will not only help parents... more »
Scalability + Support Make Splunk a Great Choice, Says Neustar | #splunkconf

Scalability + Support Make Splunk a Great Choice, Says Neustar | #splunkconf

Nathaniel Collinsworth, Media Operations, Neustar, talked about the company's experience building the UltraViolet platform around Splunk with theCUBE co-hosts John Furrier and Dave Vellante, live from Splunk .conf. UltraViolet is described by Neustar as a cloud-based "digital rights locker" system for consumers, or as Collinsworth explains, "a centralized library platform.The idea is that we can disconnect your assets from your retailer," which prevents the lock-in that usually happens when buying from a certain company. The portability of media entails certain privacy, security, tracking requirements, as Furrier pointed out. Collinsworth agreed, saying that was the basic idea of how the platform works. "For the retailers we... more »
No thumbnail available

On the Heels of Acquisition, BlackBerry Unveils Enterprise Cloud Service

BlackBerry, the second dying mobile giant to have been acquired in recent weeks, is under renewed pressure to monetize its patents and multi-billion dollar service business. To this end, the company announced a new cloud-based enterprise mobility management solution that aims to help organizations drive value in the BYOD era. Unveiled at this week’s Gartner Symposium/ITxpo 2013 event, the service marries device and mobile application management functions with a self-service console that lets users perform certain tasks without the help of an admin. BlackBerry touts that its platform eliminates the complexity associated with deploying on-premise solutions while also simplifying security configuration... more »
Organizations Should Use a Risk-Based Approach to Security | #splunkconf

Organizations Should Use a Risk-Based Approach to Security | #splunkconf

Demetrios Lazarikos, IT Security Strategist & Thought Leader, discussed the evolution of security and the latest trends with theCUBE co-hosts Jeff Kelly and Dave Vellante, live from this year's Slunk .conf. "I grew up on the computer," Lazarikos, who had his first computer at age 12, said. He has worked in the US Air Force and then the private sector, focusing on privacy and security. Talking about the views of his early career, Lazarikos commented, "a lot of companies didn't take security seriously back then." It was all about a checklist, part of the standards. "PCI changed that, people started to take security seriously." Starting... more »
No thumbnail available

iTunes Radio Beats Pandora Abroad : Apple vs. Spotify + Google

By early 2014, Apple's iTunes Radio is going to expand to both the U.K. and Canada -- before Pandora, according to a Bloomberg report from people with knowledge of the situation. Apple's iTunes Radio will also be expanding to Australia and New Zealand, where Pandora already exists, and is targeting other Nordic countries around that same timeframe. According to the same source, Apple is moving faster than Pandora because it forged agreements for international rights with Vivendi SA (VIV)’s Universal Music Group and other record companies. There is no doubt Apple has an opportunity and the reach to trump other music... more »
No thumbnail available

Dell Revives Venue Brand with Four New Tablets

Not to be outdone by Microsoft, Dell has unveiled a new line of Venue Tablets that offer greater flexibility at a lower price point than the Surface Pro 2. The crown jewel of the product family is the Dell Venue 11 Pro, a multi-purpose Windows device that gives customers a choice between cost-efficiency and performance. At $500, the cheapest model comes with an Intel Bay Trail processor and 2 gigabytes of RAM. What it lacks in horsepower it more than makes up for in mobility, weighing only 1.57 pounds with a 10-hour battery. Customers who are more keen on performance can... more »
iTunes Radio Prepping to Go Abroad as Beats Music Gears Up for Launch

iTunes Radio Prepping to Go Abroad as Beats Music Gears Up for Launch

The launch of iOS 7 gave birth to Apple’s own music streaming service.  Though it’s something music-loving fanbois are quite excited about, only those in the US are enjoying the service for now.  But that may soon change. According to reports, Apple will be launching iTunes Radio in the UK and Canada by early 2014, which will place it far ahead of Pandora, its number one contender in the music streaming business. Pandora is already available in Australia and New Zealand, and Apple plans to invade those two countries early next year.  By making  iTunes Radio available in the UK and Canada... more »
No thumbnail available

Adobe Source Code Hack Presents Serious Risk To Enterprise Customers

Last week's highly publicized theft of source code from a number of Adobe products, including its popular Acrobat and Cold Fusion tools, poses a serious threat to the thousands of enterprises around the world that have the company's products installed on their computers. Adobe's Chief Security Officer Brad Arkin wrote a detailed blog post admitting the security breach last week, describing the attacks against Adobe's network as "sophisticated," adding that they involved "the illegal access of customer information, as well as source code for numerous Adobe products". As well as the source code, the credit card records of some 2.9 million customers... more »
NSA Has Had Little Success Cracking Tor

NSA Has Had Little Success Cracking Tor

The NSA works with elaborate methods to determine the identity of users of the Tor network that allows anonymous and unobserved web surfing communications. As per article published by The Guardian, a secret presentation shows NSA was able to achieve some success, but the security architecture of Tor (The Onion Router) itself does not overturn. The secret document in turn comes from PRISM whistleblower Edward Snowden and was recognized by the cryptographer and security expert Bruce Schneier. Tor is a well-designed and robust tool for anonymity, and it is very difficult to attack it successfully. NSA used different goals to crack... more »
No thumbnail available

Dell's Mojo is Back? Venue 11 Tablet vs. iPad, Surface + More

Many thought that Dell was done with the whole mobile sector after several failed attempts on both the Android and Windows Phone platforms.  But the market continues to trend towards mobile, and despite Dell's efforts in rebuilding its expertise in logistics around enterprise services, the famed PC maker remains interested in manufacturing mobile devices. Most recently, Dell launched four new tablets the Dell Venue 7, Venue 8, Venue 8 Pro, and the Venue 11 Pro.  The Dell Venue 7 and 8 are Android-based tablets while the 8 Pro and 11 Pro are Windows Pro-based. The tablets are looking fine and might help... more »

Premium Research

- Stuart Miniman

The hyperconverged infrastructure (HCI) wave is at a tipping point of adoption. Users should focus on the operational changes that will accompany the adoption of new Server SAN architectures.

- Peter Burris

While most agree that data is valuable, accepted conventions for valuing data are few. A simple framework for valuing data in use can help digital businesses make better investment decisions.

- Peter Burris

Digital business is a strategic requirement, but must be pursued programmatically. One concept -- digital = data -- and three core capabilities must be adopted.

- Brian Gracely

Wikibon looks at how businesses are shifting their application focus towards customer-facing applications, and how this shift will impact data management and storage for CIOs.

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.

- Brian Gracely

Wikibon and theCUBE attended Red Hat Summit 2016 in San Francisco. Get analysis of the announcements, partnerships and community programs from Red Hat.