Top Stories

New Zealand Says Farewell to Software Patents With New Law

New Zealand Says Farewell to Software Patents With New Law

New Zealand government has just passed the new Patents Bill that will forbid the software patents. After a long five years of debate, delay, and intense lobbying from multinational software vendors, the country has finally nailed the law to ban the software patents. “This is a significant step towards driving innovation in New Zealand. By clarifying the definition of what can be patented, we are giving New Zealand businesses more flexibility to adapt and improve existing inventions, while continuing to protect genuine innovations," said New Zealand’s Commerce Minister Craig Foss. The bill was passed unanimously and has been warmly welcomed by the... more »
VMworld DevOps Round Up: From Software Driven Model to Change of DevOps Culture #VMworld

VMworld DevOps Round Up: From Software Driven Model to Change of DevOps Culture #VMworld

The IT world has been changing very fast over the past few years, with seemingly everything going to the cloud and virtualization. Advanced enterprises are using cloud in ways that are far beyond where most companies are today, and many others are jumping on the business opportunities that cloud can enable. Success in modern IT business comes through automation and scale and that means DevOps--where developers and system admins work closely together to realize a quicker lifecycle. At the VMWorld 2013 conference, industry leaders talked on DevOps as how the community is taking a huge part of the shift to the... more »
Save 80% of Lifetime Ops Costs with Converged Infrastructure

Save 80% of Lifetime Ops Costs with Converged Infrastructure

Converged infrastructure can save CIOs about 80% of lifetime hardware operational, testing, and planning costs. That is the result of a new Wikibon study published by Wikibon CTO David Floyer. This figure is not specific to any one converged topology, and Floyer found that none of the choices are "bad" and IT shops have places for all of them. However, the key value in choosing is the number of SKUs. The savings is greatest if the entire topography from hypervisor to application is a single SKU. Next best is a two-SKU topology with a separate application order, etc. The reason for... more »
Great IT Operations, Key Aspect of Security #VMworld

Great IT Operations, Key Aspect of Security #VMworld

David Etue, VP Corporate Development Strategy, SafeNet, provides insights into IT security in the age of virtualized environments in a live interview with theCUBE host Jeff Frick at VMworld 2013. SafeNet has just celebrated its 30th anniversary as a company and focuses on information security and data protection solutions. Commenting on SafeNet's goals at VMworld, Etue says the company focuses on adapting its portfolio to enable people to take advantage of the benefits of virtualization and cloud. Be it cloud, virtualization or SaaS, "the idea of using unified infrastructures has made folks nervous," Etue states. In the traditional approach to security dollars... more »
Fujitsu Promises Continued End-to-End Innovation | #VMworld

Fujitsu Promises Continued End-to-End Innovation | #VMworld

In day four of VMworld 2013, theCUBE offered extended coverage with a special interview with Richard McCormack, Senior Vice President of Marketing at Fujitsu about some of the company’s past innovations and a look to the future. McCormack described the company’s SAP appliance as something that can be delivered into a customer environment alongside its existing infrastructure. Essentially, it can go in as a “sidecar”. It is a fully virtualized appliance with smooth deployment, and VMware played a key part in making that happen. Fujitsu, he stressed, is not just a company producing hardware but also service for the customers. “We have... more »
VMware’s Strong Virtualization Core and Possible Future in Networking | #VMworld

VMware’s Strong Virtualization Core and Possible Future in Networking | #VMworld

At the close of Day 3 of VMworld 2013, theCUBE hosts Dave Vellante and Stu Miniman met to wrap-up the day and discuss their impressions of VMworld, VMware, and the future of the industry. According to Vellante, VMware’s vSphere is its core and is very strong. The company is continuously launching new capabilities from that core, producing new revenue opportunities, and those opportunities are increasingly becoming centered around the concept of a software-defined data center. Outside that core, however, they have more work to do. VMware is an ambitious company, and what they are trying to do with networking is not... more »
EMC’s Role in VMware’s Storage Future | #VMworld

EMC’s Role in VMware’s Storage Future | #VMworld

Since EMC’s acquisition of VMware in 2004, much has been said about the relationship between the two companies. How does a company react when its subsidiary partners with competition? Does EMC always have the inside track on VMware? Hosts of the CUBE, Dave Vellante and Stu Miniman had the opportunity to talk with Chad Sakac, SVP of Global SE at EMC regarding this and the future of storage as it relates to virtualization. VMware’s innovation continues to push the envelope and keep customers happy, Sakac explained, and its change in vSphere 5.5 to support vswitch  was an example of that innovation.... more »
Number of Tor Client Users Explodes Overnight - But Why?

Number of Tor Client Users Explodes Overnight - But Why?

So it appears that people do care about their privacy after all. What with the never-ending revelations of US government spying and various other security concerns over the last few months, people could be forgiven for becoming a bit complacent over it all, but apparently that's not the case. The evidence? The number of people using Tor clients – which serve to bounce your IP address all over the web, making netizens virtually untraceable – has apparently doubled in the last ten days. The rapid growth in Tor client users since August 19 was first noted by Roger Dingledine, current director... more »
Apple MAC OS X Clock Vulnerability Grants Time Travelling Hackers Full Access

Apple MAC OS X Clock Vulnerability Grants Time Travelling Hackers Full Access

If you're still clinging to the myth that just because you're using an Apple Mac, your data is safe from hackers... Well, stop it. Fact is, Apple's Mac OS X is no better than any other operating system – no matter if you're running Windows, Linux or anything else, there are dozens of security weaknesses and that's just something you're gonna have to accept. Take the latest new bug – actually an old, unaddressed bug that Apple's known about for five months already – which has suddenly become a whole lot easier to exploit, putting the data of millions of Mac... more »
How QR Codes Can Deliver the Internet of Everything

How QR Codes Can Deliver the Internet of Everything

We’ve often heard the term "Internet of Things," and immediately most of us think of devices possessing the ability to connect to the Internet and deliver services in one way or the other. Most IoT devices do just that, allowing people to track items, connect with other people, navigate, get a better sense of their well being and so on, but what if there was a way to turn IoT into the 'Internet of Everything', paving the way for the enterprise to better cater to its customers? Doc Searls of the Harvard Business Review may have finally hit on a way... more »

Premium Research

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.

- Brian Gracely

Wikibon and theCUBE attended Red Hat Summit 2016 in San Francisco. Get analysis of the announcements, partnerships and community programs from Red Hat.

- Brian Gracely

Wikibon and theCUBE attended DockerCon 2016 in Seattle. Get analysis of the announcements, partnerships and community programs from Docker.

- Brian Gracely

Wikibon looks at the evolution of PaaS and Container platforms, and evaluates the critical architectural criteria that should be considered by CIOs, Enterprise Architects, Developers and Operational teams.

- Ralph Finos

Based on market conditions that we have observed over the past year and the recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM, we expect that public cloud spending will continue to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 (19% CAGR). Each public cloud segment will have rapid growth rates: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR) during this period. How big will public cloud be? By 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.