Top Stories

Virtualization Has Become Mainstream + Simplified Infrastructure Is Everything | #VMworld

Virtualization Has Become Mainstream + Simplified Infrastructure Is Everything | #VMworld

John Furrier was joined for the last day of VMworld 2013 in San Francisco by Jeff Frick and they interviewed Vanessa Alvarez, Head of Marketing at Scale Computing, for the flagship interview series theCUBE. Alvarez is a self-proclaimed "fan of converged infrastructure" and she got to talk in depth about Scale Computing, virtualization and the trends in the business. "We have a converged infrastructure of server storage and virtualization. The fact that VMware is finally bringing those pieces together is [a] testament to the fact that converged infrastructure is the future of IT." In terms of user experience, Alvarez believes "today IT... more »
The Dark Side of Failed Indie Game Development: It's no Path of Roses

The Dark Side of Failed Indie Game Development: It's no Path of Roses

The indie game developer is filled with starry eyed, hoping to make the game of their dreams. But the game development is not easy, and has many snags along the way. You’ve probably heard this before, but many indie game developers either quit or fail to finish their game projects. There are literally thousands of failures you have probably never heard of. Keith Judge, a programmer in the games industry for nearly 13 years and currently at Pitbull Studio in Guildford, working with Epic Games on Unreal Engine 4, shared his story of his experience as independent indie game developer. Not a... more »
Android is #1 – in Malware so Who Else is On The List?

Android is #1 – in Malware so Who Else is On The List?

This shouldn’t surprise anyone, Android is the top mobile malware target in the market and it wasn’t close.  79 percent of all mobile threats in 2012 had Android dead in its sights.  That finding published by Public Intelligence and the Department of Homeland Security’s Cyber Intelligence Analysis Division also indicates that mobile malware poses a threat to security personnel and emergency responders that are increasingly dependent on mobile devices in the conduct of their duties.  The report also points out how much diversity there is in base Android versions out there, a problem known as fragmentation.  That fragmentation is an... more »
Broadcom Accelerates Internet of Things with Wearable WiFi Tech

Broadcom Accelerates Internet of Things with Wearable WiFi Tech

Semiconductor maker Broadcom has introduced a new specification that enables connected devices to communicate over Wi-Fi without an access point or computer. The technology promises to open the doors for low-cost wearable gadgets that can exchange data via smartphones and tablets. Wireless Internet Connectivity for Embedded Devices (WICED) Direct, as the solution is known, has already been made available for select OEMs. Broadcom revealed that “emerging segment leaders” are in the process of developing blood pressure monitors, glucometers, smart watches and other devices that leverage WICED Direct to collect user data. "The value of a wearable device lies in its ability to connect... more »
IT Transformation Targets Increased Revenue, Risk and Cost Reduction #VMworld

IT Transformation Targets Increased Revenue, Risk and Cost Reduction #VMworld

Ted Newman, Senior Director of Cloud and IT Transformation for EMC Global Services, discussed the company's take on hybrid cloud and IT transformation in the enterprise with theCUBE co-hosts Dave Vellante and John Furrier, live at VMworld 2013. Exploring cloud trends, Newman said the solution EMC presented in their Monday session at VMworld was designed to bring apps from the public cloud back into the private cloud. As a use case example, EMC IT saved a couple million dollars by bringing apps in-house and running on VMware services. The company had developed apps for public cloud in the past, and, along with... more »
No thumbnail available

VMware Faces Uphill Fight in VDI Marketplace

VMware is an incredible company that has grown from nothing in the last decade to be a driving force in the revolution that is sweeping through IT. And Pat Gelsinger, who took over as CEO last year, is a true visionary who has made dramatic changes that have on the whole made VMware stronger. The company's growth record over the last year, this week's hugely successful VMworld 2013, and most important, its vision of the Software-Defined Data Center, are all evidence of that. A major part of that vision is VDI. When Gelsinger streamlined the company, shuttering some operations and spinning... more »
How Often Governments Knock at Facebook, Altogether 38,000 Requests in 2013

How Often Governments Knock at Facebook, Altogether 38,000 Requests in 2013

The discovery of NSA snooping has at least one positive effect: several tech companies are trying to point to sudden transparency. Almost every day there is news now about which networks with which governments work together and where they get their data. Facebook yesterday released its first “Global Government Requests Report”, which contains the government requests to Facebook in the first half of 2013. According to Facebook’s statement, the report contains all information requests by government authorities between 1 January 2013 and 30 June 2013. It is interesting and not surprising to note that the US by far the largest data hungry country on... more »
Quantum Cryptology: The Holy Grail of Data Encryption?

Quantum Cryptology: The Holy Grail of Data Encryption?

With stories of new cyberattacks hitting the headlines every other day, not too mention the fact that the NSA seems to have the ability to help itself to whatever data it wants, more advanced encryption techniques can't come soon enough. Which is why a team of British physicists' research into an encryption method called quantum cryptology is generating so much excitement. It might sound like something out of Star Trek, but quantum cryptology is very real. It's a complex technique, but it also has the potential to be a gamechanger as far as encryption goes. The physicists working on it claim... more »
VDI Now!

VDI Now!

One of the most important messages of VWworld 2013 to CIOs is you need VDI, not in 18 months, but now. And if you are not implementing VDI right now, be assured that at least some of your business units will be signing contracts with VDI-as-a-Service vendors before the end of the year. How important is this? VMware CEO Pat Gelsinger has made VDI one of the three main focus points of the streamlined, tightly focused VMware he created when he took the company over a year ago. He has named Sanjay Poonen, GM VMware End User Computing to head of... more »
Software-defined Infrastructure as a Self-driving Car | #VMworld

Software-defined Infrastructure as a Self-driving Car | #VMworld

From San Francisco, VMworld 2013, John Furrier and Dave Vellante speak with Iddo Kadim, Marketing Director, Data Center Group with Intel Corporation. Kadim's team develops solutions with the ecosystem in order to expose Intel's technologies in ways that deliver value for IT, particularly in the areas of virtualization and security. With all the hype around virtualization, people tend to forget that all these platforms run on physical infrastructure. Intel has an initiative called "Trusted Compute Pools," based on Intel Trusted Execution Technology. The lack of visibility of infrastructure in the cloud is the problem this initiative aims to address. "With Intel TXT,... more »

Premium Research

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.

- Brian Gracely

Wikibon and theCUBE attended Red Hat Summit 2016 in San Francisco. Get analysis of the announcements, partnerships and community programs from Red Hat.

- Brian Gracely

Wikibon and theCUBE attended DockerCon 2016 in Seattle. Get analysis of the announcements, partnerships and community programs from Docker.

- Brian Gracely

Wikibon looks at the evolution of PaaS and Container platforms, and evaluates the critical architectural criteria that should be considered by CIOs, Enterprise Architects, Developers and Operational teams.

- Ralph Finos

Based on market conditions that we have observed over the past year and the recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM, we expect that public cloud spending will continue to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 (19% CAGR). Each public cloud segment will have rapid growth rates: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR) during this period. How big will public cloud be? By 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.