Top Stories

Google Privacy? Sorry, It's Non-Existent

Google Privacy? Sorry, It's Non-Existent

Will using an online service mean that you’re willingly surrendering your privacy?  It shouldn’t, but if the Consumer Watchdog’s evidence against Google is to be believed, then we shouldn’t expect our privacy to be honored. The Consumer Watchdog has just published a 39-page motion filed by Google, in which the search giant was hoping that allegations regarding them snooping around emails to deliver more targeted ads would be dismissed. “Just as a sender of a letter to a business colleague cannot be surprised that the recipient’s assistant opens the letter, people who use web-based email today cannot be surprised if their communications... more »
No thumbnail available

The CIO Knows Best, Says Voonami’s Steve Newell

Voonami, a Utah-based provider of colocation, hosting and managed services, has successfully added 20 terabytes to its environment using hybrid storage arrays from Tegile. Steve Newell, a sales engineer with Voonami, discussed his company’s use case during last month’s Wikibon Peer Incite event. Before the upgrade, Voonami’s public cloud offering ran in an environment that combined NetApp storage with Cisco UCS servers and VMware virtualization software. The company’s IT department was “very happy” with the features of their NetApp deployment, Newell said, but they concluded that scaling the environment by 20 terabytes using a disk-only solution would cost too much. Voonami sought... more »
Android Malware Problems Pile Up with Bitcoin & Google Cloud Messaging

Android Malware Problems Pile Up with Bitcoin & Google Cloud Messaging

Security problems for Android are piling up, with an additional two vulnerabilities discovered in the mobile operating system over the last 24 hours, including one that was said to have been exploited in a $5,700 Bitcoin heist, and a second that allows cybercriminals to control malware on infected devices via the Google Cloud Messaging service. In the first instance, Google's Android security team has already put out a fix for the mobile operating system's Java-derived pseudorandom number generator, or PRNG, after some Bitcoin users reported small amounts of money being stolen. The bug in PRNG meant that Android would occasionally issue... more »
Manning Apologizes for Wikileaks Actions Prior to Sentencing

Manning Apologizes for Wikileaks Actions Prior to Sentencing

The fate of Pfc. Bradley Manning hangs in the balance as the sentencing hearing in the Wikileaks case plays out in a Fort Meade, MD courtroom.  He addressed the court Wednesday, apologized for hurting the country, asked for the opportunity to contribute something to the society and get a college degree.  In his statement he explained some of his actions, admitting to knowing exactly what he was doing when he released the information, but not knowing that the effects could harm the U.S.  He also stated that he should have worked more inside the system to bring light to aspects... more »
IT Trends Disrupting Enterprise Investment in Data Center Infrastructure

IT Trends Disrupting Enterprise Investment in Data Center Infrastructure

The many responsibilities of the CIO include determining if the company’s software needs are best served by an off-the-shelf solution, a customizable product that can be tailored to the organization's use case, or an internally developed application. According to The 1610 Group founder and managing consultant Scott Lowe, the rapid pace of innovation is forcing a growing number of CIOs to decide between buying and building in a new context: hardware. In Lowe’s view, developing applications from scratch is analogous to “[piecing] together the entire data center component by component” and performing compatibility and interoperability testing in-house. At the other end... more »
BlackBerry in Final Death Throes - Doesn't Matter if Sold or Private

BlackBerry in Final Death Throes - Doesn't Matter if Sold or Private

News hit this week confirming what many people had speculated about for a while now, that BlackBerry is officially up for sale.  By forming a special committee to explore strategic alternatives, they have opened the door for partnerships, joint ventures, going private, but ultimately it is most likely that the company and its assets are for sale.  So now BlackBerry is in a pretty familiar position, too little too late.  That was the reality of the arrival of BlackBerry 10 earlier this year.  Now the company has opened the door to possibilities rather than continue down the path they’re on. ... more »
Continuuity Brings Real Time Analytics to Lotame Big Data Platform

Continuuity Brings Real Time Analytics to Lotame Big Data Platform

One of the problems of large data set analysis is that big data is constantly growing. In addition, businesses have discovered that Big Data is much more useful when analyzed in real time or a more timely manner--especially when historical context can be compared to current trends on the fly. Lotame Solutions Inc., the global leader in unifying data management and an early adopter of Hadoop, collects and process large volume of data on large clusters in production. However, the company lacks providing much faster analysis of real time data. For this reason, Lotame today entered a strategic partnership with Continuuity, creator... more »
Next Generation of 4K Graphic Chips from AMD and Nvidia Likely to Boost PC Gaming Market

Next Generation of 4K Graphic Chips from AMD and Nvidia Likely to Boost PC Gaming Market

Many people that buy graphics cards severely underestimate the value of updating GPU drivers. You could buy a GPU for a certain purpose, but if one of the things that you need it to do simply doesn't work, it's worthless. Sony and Microsoft both claimed that their Xbox One and PS4 consoles will be able to playback video in 4K, but not necessarily games in 4K. The 4K recently completed the establishment of standards and yet to see widespread adoption due to its high cost. While at the recently concluded E3, both AMD and NVIDIA talked about their plans for 4K... more »
Bitcoin Weekly 2013 August 14: US Regulators Aim Their Sights at Bitcoin

Bitcoin Weekly 2013 August 14: US Regulators Aim Their Sights at Bitcoin

Virtually unnoticed for some time, Bitcoin has just become of major interest to regulators—specifically the  New York Department Of Financial Services and the US Senate. In a statement released alongside the revelation that the NYDFS had submitted 22 subpoena’s to various big players in the Bitcoin market, Benjamin Lawsky, who heads the department, called Bitcoin “a virtual Wild West.” In an attempt to explain this action, Lawsky appeals to criminality and national security. Read the full statement here at Business Insider. "We believe that – for a number of reasons – putting in place appropriate regulatory safeguards for virtual currencies will be... more »
Tableau  Shows Spectacular Growth in First Quarter Out of the Box

Tableau Shows Spectacular Growth in First Quarter Out of the Box

In its first quarter as a public company, Tableau Software hit the ball out of the park, with revenues of $49 million, 71 percent year-over-year growth. It signed up more than 1,500 new customers, growing its customer base to 13,500 in more than 100 countries, and expects full year revenues of $198 million to 202 million, says CEO Christian Chabot. Its secret, writes Wikibon Principal Research Contributor and Big Data Analyst Jeff Kelly, is its pioneering data visualization technology designed for business end-users to create and edit their own graphs on the fly rather than having to send requests to data... more »

Premium Research

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.

- Brian Gracely

Wikibon and theCUBE attended Red Hat Summit 2016 in San Francisco. Get analysis of the announcements, partnerships and community programs from Red Hat.

- Brian Gracely

Wikibon and theCUBE attended DockerCon 2016 in Seattle. Get analysis of the announcements, partnerships and community programs from Docker.

- Brian Gracely

Wikibon looks at the evolution of PaaS and Container platforms, and evaluates the critical architectural criteria that should be considered by CIOs, Enterprise Architects, Developers and Operational teams.

- Ralph Finos

Based on market conditions that we have observed over the past year and the recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM, we expect that public cloud spending will continue to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 (19% CAGR). Each public cloud segment will have rapid growth rates: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR) during this period. How big will public cloud be? By 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.