Top Stories

iTunes Radio Prepping to Go Abroad as Beats Music Gears Up for Launch

iTunes Radio Prepping to Go Abroad as Beats Music Gears Up for Launch

The launch of iOS 7 gave birth to Apple’s own music streaming service.  Though it’s something music-loving fanbois are quite excited about, only those in the US are enjoying the service for now.  But that may soon change. According to reports, Apple will be launching iTunes Radio in the UK and Canada by early 2014, which will place it far ahead of Pandora, its number one contender in the music streaming business. Pandora is already available in Australia and New Zealand, and Apple plans to invade those two countries early next year.  By making  iTunes Radio available in the UK and Canada... more »
No thumbnail available

Adobe Source Code Hack Presents Serious Risk To Enterprise Customers

Last week's highly publicized theft of source code from a number of Adobe products, including its popular Acrobat and Cold Fusion tools, poses a serious threat to the thousands of enterprises around the world that have the company's products installed on their computers. Adobe's Chief Security Officer Brad Arkin wrote a detailed blog post admitting the security breach last week, describing the attacks against Adobe's network as "sophisticated," adding that they involved "the illegal access of customer information, as well as source code for numerous Adobe products". As well as the source code, the credit card records of some 2.9 million customers... more »
NSA Has Had Little Success Cracking Tor

NSA Has Had Little Success Cracking Tor

The NSA works with elaborate methods to determine the identity of users of the Tor network that allows anonymous and unobserved web surfing communications. As per article published by The Guardian, a secret presentation shows NSA was able to achieve some success, but the security architecture of Tor (The Onion Router) itself does not overturn. The secret document in turn comes from PRISM whistleblower Edward Snowden and was recognized by the cryptographer and security expert Bruce Schneier. Tor is a well-designed and robust tool for anonymity, and it is very difficult to attack it successfully. NSA used different goals to crack... more »
No thumbnail available

Dell's Mojo is Back? Venue 11 Tablet vs. iPad, Surface + More

Many thought that Dell was done with the whole mobile sector after several failed attempts on both the Android and Windows Phone platforms.  But the market continues to trend towards mobile, and despite Dell's efforts in rebuilding its expertise in logistics around enterprise services, the famed PC maker remains interested in manufacturing mobile devices. Most recently, Dell launched four new tablets the Dell Venue 7, Venue 8, Venue 8 Pro, and the Venue 11 Pro.  The Dell Venue 7 and 8 are Android-based tablets while the 8 Pro and 11 Pro are Windows Pro-based. The tablets are looking fine and might help... more »
Splunk Conference DevOps Round Up: Transitioning Beyond Machine Log Data | #splunkconf

Splunk Conference DevOps Round Up: Transitioning Beyond Machine Log Data | #splunkconf

At its annual Worldwide Users’ Conference in Las Vegas last week, the machine data analytics company Splunk continues to enhance its flagship machine data search engine so it can be used by business analysts and managers. The company advanced its portfolio of products including a new version 6.0 of its enterprise edition cloud service and adding more business intelligence capabilities to its namesake engine Splunk Cloud service is now powered by Amazon Web services and includes access to Splunk Enterprise apps, APIs, alerting, and role-based access controls. With an enhanced user experience, simple management of enterprise deployments, and a rich developer... more »
The Saga of Silk Road’s Dead Pirate Roberts, Ross William Ulbricht

The Saga of Silk Road’s Dead Pirate Roberts, Ross William Ulbricht

The downfall of Silk Road and the capture of the alleged Dread Pirate Roberts has made digital newsreels and much digital ink has been spilled over the issue, and the saga is far from over. The presence and persistence of the Silk Road as a part of the dark web, hidden from prying eyes within the confines of the Tor network (a technology the NSA has complained about because they couldn’t easily break it) shows how successful the confluence of anonymity, security, and Bitcoin can be when put to use together. Recently, we even learned that the FBI has failed to... more »
Ninjas and Robots Invade Your Smart Home

Ninjas and Robots Invade Your Smart Home

This week’s SmartHome roundup features a ninja that controls your smart home, a robot that keeps it clean, and a cube that entertains your furry pals while you’re out. Ninja Blocks   Ninjas are famous for their stealth, so it’s fitting to have technology that monitors your home inconspicuously, even when you are away.  For $199 Ninja Blocks offers the Ninja Kit, which comes with one wireless motion sensor, one wireless door/window contact sensor, one wireless button that serves as a doorbell, one Wireless temperature and humidity sensor, the Ninja Block equipped with BeagleBone Linux computer with an Arduino, one Ethernet Cable, one Micro... more »
New Poll Reveals Browser Games Leads Console Games in Popularity

New Poll Reveals Browser Games Leads Console Games in Popularity

A new survey staged by Goo Technologies and conducted online within the United States by Harris Interactive suggests that browser games have aced out the console gaming market in the US. The findings of its 2013 State of Browser Gaming Index fielded among more than 2,000 Americans, aged 18 and older found that 52 percent gamer preferred browser games above any other type of game. Today, an increasing number of users are using mobile phones and tablets to play games. The survey found that 85 percent of Americans prefer mobile as there is no compromise on quality, speed or graphics and... more »
Google Plans To "Mug Off" Mugshot Websites

Google Plans To "Mug Off" Mugshot Websites

Few ex-offenders enjoy being reminded of the fact that they were once arrested and charged with a criminal offence, particularly when those people have since moved on to become hard working, honest members of society. The only problem is, even after their case has been resolved, it can be quite difficult to forget that uncomfortable memory – particularly when there are dozens of websites out there that make a habit of reposting people's mug shots in order to make a quick buck off of them. Some argue that such websites provide a good service to the public, allowing them to identify... more »
Bottlenose Launches Nerve Center to Help Enterprises Reveal Unknown Unknowns

Bottlenose Launches Nerve Center to Help Enterprises Reveal Unknown Unknowns

Analytics startup Bottlenose is taking trend intelligence to the next level with a new application for finding patterns in real time data. Dubbed Nerve Center, the tool is built atop Trendfluence, a social discovery platform that the company has been working to bring to the enterprise since closing its $3.6 million Series A funding round in August. Trendfluence utilizes multiple patent-pending technologies to process and visualize large volumes of streaming data, including social interactions and operational workloads. Nerve Center leverages this functionality to rank trends by business impact and help decision makers gain a better understanding of the various factors that... more »

Premium Research

- David Floyer

Server SAN added a $1.25 Billion dollars in 2015, and grew strongly from worldwide revenues of $1.25 Billion in 2014 to $2.5 Billion 2015. The overall growth of was 99%. The top three vendors were Nutanix, VMware and EMC ScaleIO, and they accounted for 43% of the market. ScaleIO had the most explosive growth of 3.5x from 2014 to 2015. Enterprise Server SAN is projected to grow worldwide revenue at 22% CAGR from 2015-2026, from $2.5 Billion in 2015 to $22 Billion in 2026 Wikibon strongly recommends 2016 be the year Server SAN initiatives are installed for evaluation and production.

- Stuart Miniman

The hyperconverged infrastructure (HCI) wave is at a tipping point of adoption. Users should focus on the operational changes that will accompany the adoption of new Server SAN architectures.

- Peter Burris

While most agree that data is valuable, accepted conventions for valuing data are few. A simple framework for valuing data in use can help digital businesses make better investment decisions.

- Peter Burris

Digital business is a strategic requirement, but must be pursued programmatically. One concept -- digital = data -- and three core capabilities must be adopted.

- Brian Gracely

Wikibon looks at how businesses are shifting their application focus towards customer-facing applications, and how this shift will impact data management and storage for CIOs.

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.