Top Stories

Naeem Hashmi Talks Analytics and Informatics In Healthcare at MITIQ

Naeem Hashmi Talks Analytics and Informatics In Healthcare at MITIQ

Naeem Hashmi, Chief Research Officer at Information Frameworks, explored the different perspectives of data analytics vs. informatics and challenges for the healthcare industry in making full use of their electronic systems and data with theCUBE co-hosts Dave Vellante and Paul Gillin, live at the MITIQ Symposium. Describing his professional focus, Hashmi says he has always worked in an "area where how we are going to manage information in the future" is paramount. His work involves building architecture and reference models, and working with vendors as well as IT organizations, and helping them establish how to roll out their vision. "I'm a vision type of person,"... more »
Cisco Shells Out a Massive $2.7B for Sourcefire, Moves Toward New Model of Network Security

Cisco Shells Out a Massive $2.7B for Sourcefire, Moves Toward New Model of Network Security

Cisco has entered a definitive agreement to buy Sourcefire, a Columbia, MD-based provider of cybersecurity solutions. The company is best known for Snort, a widely used intrusion detection system created by founding CTO Martin Roesch. Under the terms of the deal, Cisco will pay $76 per share of Sourcefire for a total of $2.7 billion. The all-cash transaction is expected to be completed later this year, at which point the firm will be integrated into Cisco’s Security Group. "Cisco's acquisition of Sourcefire will help accelerate the realization of our vision for a new model of security across the extended network," said Roesch,... more »
Apple's Feeling Sick: Can It Get Well Soon?

Apple's Feeling Sick: Can It Get Well Soon?

Tech giants have had a pretty miserable time of late. Honors for the biggest fail went to Microsoft, which wrote off almost $1 billion on unsold Surface RT devices, while at the same time watching helplessly as its PC business continues to wither. Intel and AMD also took a hit for the very same reason, while even Google saw a slowdown in growth thanks to a reduction in ad rates. Which is why it's no surprise to see Apple report a fair-to-middling quarter at best – while it avoided a decline, its growth remained essentially flat. Keeping Apple's head above the... more »
Cloud Deployment: A Bottleneck No More Using CloudMunch Open DevOps Management Platform

Cloud Deployment: A Bottleneck No More Using CloudMunch Open DevOps Management Platform

OpenStack is quickly becoming the global cloud computing platform standard. So much so that developers’ roles are changing with much more focus on automation technologies and cloud systems. Today, developers are often working at assembling services, collaborating with external cloud providers, and using automation tools. All the cards indicate that OpenStack as a framework and community is heading in the right direction. OpenStack has emerged as a broadly adopted open-source IaaS platform across enterprises and community. Now to support OpenStack cloud deployment, CloudMunch, the DevOps management platform provider, introduced the world’s first Open DevOps platform for OpenStack. In order to keep the... more »
No thumbnail available

Nexus for Breakfast: Google’s Sundar Pichai Discusses Latest Tablet, Google Play Additions and Chromecast for TV

Today at 9am PST/12pm EST, Google invited journalists to “Breakfast with Sundar Pichai,” to serve up its latest Android and Chrome developments since Google I/O. A few other Google heads joined Pichai in revealing and explaining Google’s new Nexus 7 Tablet, the latest from Google Play and Chromecast. The latter is a new device that aims to make it quick, easy and efficient to stream video, music and photos from connected devices to a TV screen. The New Nexus 7 The main dish, naturally, was Google’s new 7-inch Nexus 7 tablet, launched today. At 0.64lbs (290 grams), the tablet is lighter and thinner... more »
How MySpace, Facebook + Twitter Became "Accomplices" to Murder

How MySpace, Facebook + Twitter Became "Accomplices" to Murder

There’s no denying that there are a lot of risks in using the Internet, specifically social networking sites.  These means of connecting with others can be used to spread malware, steal an identity, and did you know that it can even result in death? Some people have used these social sites to lure people out of the comfort of their homes and out into the open where harm can be inflicted upon them.  Below we've compiled some of the most telling cases of social media experiences gone wrong.  Take these as an important life lesson that virtual environments continue to have... more »
NerdyData--A Search Engine for HTML, JavaScript, and Source Code

NerdyData--A Search Engine for HTML, JavaScript, and Source Code

A startup claims to have come up with a better way for developers to find source code. Traditionally, developers use the regular search engines, such as Google, Bing, but those are unfriendly to searching source code. If you are a web developer or programmer who often needs to shuffle between writing code in multiple languages, check out NerdyData, a new startup search engine for all programming related documentation including HTML, JavaScript, and Source Code. Google's search engine is geared mostly towards providing answers to a specific query asked by the user, whereas NerdyData is developed to give the best list of results... more »
Acquia Launches Drupal Rich Digital Experience Platform Acquia Cloud Site Factory

Acquia Launches Drupal Rich Digital Experience Platform Acquia Cloud Site Factory

Burlington-based Acquia, which provides tools for enterprise users of the open-source Drupal web publishing platform, today announced the Acquia Cloud Site Factory, a new digital experience platform for building digitally enriched brand, campaign and promotional websites for marketers. Built on Acquia’s proven Drupal Gardens OpenSaaS software and infrastructure, Acquia Cloud Site Factory provides support for marketers to create dynamic, customized sites in minutes. The platform has pre-defined templates making it easy for brand campaigner to include repeatable content, design, features and structure into the site. The OpenSaaS application Gardens allows users to quickly build complex websites. And Acquia Cloud Site Factory system... more »
PRISM Scandal Draws Bipartisan Support to Neuter the NSA

PRISM Scandal Draws Bipartisan Support to Neuter the NSA

Representative Justin Amash, a Michigan Republican, has proposed to limit the National Security Agency’s funds that it uses to collect data on telephone calls made by U.S. citizens unless a Foreign Intelligence Surveillance Court order stipulates that the records pertain to an individual under investigation.  His proposal is backed by Representatives John Conyers, a Michigan Democrat, Mick Mulvaney, a South Carolina Republican, Jared Polis, a Colorado Democrat, and Thomas Massie, a Kentucky Republican. While another amendment offered by Florida Republican Representative Richard Nugent proposes that the NSA will be prohibited from using funds in the almost $600 billion measure to “acquire,... more »
Cisco Acquires SourceFire in $2.7B CyberSecurity Deal

Cisco Acquires SourceFire in $2.7B CyberSecurity Deal

  Cisco is acquiring SourceFire, and so begins a new security push.  At a purchase price of $2.7 Billion @ $76 per share, it’s rather significant.  Cisco is the largest networking equipment manufacturer in the business, and is known to hold a significant portion of their cash overseas.  This makes a domestic purchase on this order all the more telling.  SourceFire is known for their Intrustion Detection Systems (IDS) technology and the open source tool Snort.  Snort has a long history in security and it has been used extensively in government environments. "‘Buy' has always been a key part of our build-buy-partner innovation... more »

Premium Research

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.

- David Vellante

In the spring of 2016 we began an initiative to organize a group of CxOs to discuss the issue of cyber security. One thing we’ve learned about the topic of security is it’s hard to fake. We’re not security technology experts. As such we decided to focus on business issues. We observed heightened activity around […]

- Peter Burris

Leading digital companies are using simple top-level frameworks for setting digitization priorities. At the center of the approaches we've seen are three questions: What do we want to do better; who are we going to engage; and how are we going to institute the digital capabilities.

- George Gilbert

Enterprises must navigate the universe of big data applications by recognizing that application platforms will alternately empower and constrain enterprises along a path of ever more sophisticated applications. Data lakes, intelligent systems of engagement, and self-tuning systems of intelligence all build on each other in terms of capabilities. But the underlying platforms will evolve in a cycle of simplicity, complexity from adaptive stretch, and simplicity again via a platform refresh.

- George Gilbert

Big data products and workloads remain too immature for standard benchmarks capable of providing truly comparable results. Users that need benchmarks for contracting or comparison purposes should run their own stylized workloads based on their intended usage scenarios.

- Ralph Finos

Users considering public cloud for business and IT workloads should evaluate the types of use cases and workloads that have wide successful deployment in the public cloud today. In order to help users to better understand the customers and workloads being served in the public cloud today, Wikibon examined the brief descriptions of approximately 650 customer solution stories on the Amazon Web Services (AWS) website and classified each according on a number of characteristics. This research reveals some interesting insights about the public cloud leader’s business, and therefore about public cloud utilization generally.

- David Floyer

The Wikibon premise in this research is that this converged environment is a win-win environment for both vendors, ISVs and enterprise IT. Testing of the converged system solution is more robust, and the reduction in the number of solution types significantly lowers testing and installation costs for the vendor. ISVs can lower the cost of deployment, deliver application value faster, and drive additional upgrade value much faster. Converged enterprise IT systems (private clouds) are more agile, more reliable, more secure and have the similar costs to public clouds.

- Brian Gracely

Wikibon looks at the emerging Cloud-native application architectures. This research focused on the scope of microservices, the domains of interaction between services, and how data services and sources are changing with these new applications.

- Brian Gracely

Faced with the choices of modernizing existing applications or starting new projects, IT organizations have many options. Wikibon looks at the vast number of options today, with a methodology to evaluate choice vs. risk.

- David Floyer

There are no enterprise organizations that have married the business, digital creativity and IT as seamlessly as Weta Digital.