Top Stories

iPhone Biometrics Rumors Hint at iWatch & Apple TV Launch

iPhone Biometrics Rumors Hint at iWatch & Apple TV Launch

Fanboy or not, you’ve probably heard that Apple is holding a press event on September 10, 2013 and the company is expected to unveil a new iPhone, or iPhones, if rumors are to be believed. But aside from the iPhone 5S and/or the iPhone mini, sources claimed that Apple will also be unveiling a thinner version of the iPad and an iPad mini with Retina Display, but at a later date.  Remember last year when Apple held two events for their products?  One was iPhone focused, then the other was all about the iPad mini and the 4th generation iPad.  It... more »
No thumbnail available

Symphony Crescendos Their Violin with New Flash Memory Array

On Monday, Violin Memory Inc. announced the 6264 flash Memory Array, its next generation of flash memory storage that delivers 64TB of capacity in a mere 3U footprint. And to complement the 6000 Series Arrays, the new Violin Symphony Management System was also introduced.  Symphony aims to enable enterprise-wide management of Violin Memory Arrays through a single pane of glass view - from any device, anytime. “Competitive architectural approaches based on SSDs short change the actual performance capabilities of flash memory,” said Don Basile, CEO of Violin Memory. “As semiconductor process geometries shrink, flash memory gets slower and more error-prone. Violin’s unique... more »
No thumbnail available

Doubling Down On Virtualization: HP Makes Big Announcement

In a big announcement out of Palo Alto today, HP rolled out their new HP Converged Storage technology. This investment in the transition to software-defined storage (SDS) is confirmation of what we at SiliconANGLE have been reporting on for some time. HP’s new StoreVirtual Virtual Storage Appliance (VSA) promises to significantly reduce IT costs for businesses and organizations. In addition to reducing cost, companies that elect to transition to SDS will also enjoy increased agility and capacity utilization. This has been brought about thanks to new features like automated sub-LUN (logical unit number) storage tiering along with increased VMWare and Microsoft... more »
Wearable Tech in the Enterprise: Should IT Managers Be Worried?

Wearable Tech in the Enterprise: Should IT Managers Be Worried?

Disruptive technologies are known as such for the way they shake IT systems to the core, and by all accounts we're about to crash headlong into the next one, with the emergence of wearable technologies just around the coriner. We've actually had wearable computing in various forms for some time – certain industries, like the military and healthcare have used various clip on gadgets for years – but for the rest of us, this type of hardware was almost unheard of. Not anymore. With the rise of gadgets like Google Glass and the Pebble Smartwatch, these kinds of devices are on the... more »
Rumor: Amazon to Enter the Gaming Console Market?

Rumor: Amazon to Enter the Gaming Console Market?

The success of games on mobile devices has begun to significantly affect the video game industry. Free-to-play format in mobile devices has begun to invade both PC gaming and console gaming, and nearly all developers and gaming publishers are now putting out games for Android and iOS devices. The success of Oculus Rift and the Ouya Kickstarter and the recently released Nvidia Shield console has shown that there is still some demand for more casual video games on a larger screen. While the two giants of the video game, Microsoft and Sony, will boost the console wars at the end of... more »
Made in North Korea--The First Smartphone Inspired by Dictator Kim Jong-un?

Made in North Korea--The First Smartphone Inspired by Dictator Kim Jong-un?

South Korea dominates the world of smartphones with the Samsung and LG taking half of the world's smartphone market. Taking into account only a sense of one-upmanship, it makes sense that North Korea may want to follow suit. North Korea has unveiled its new smartphone, the “Arirang,” an Android clone named after a famous Korean folk song that’s also something of a national anthem. Kim Jong-un, the supreme leader of the Democratic People's Republic of Korea, visited a factory at his home turf Pyongyang specializes in the production of smartphones, although cellphone data services are still illegal in the country. The so-called... more »
No thumbnail available

Lavabit Folds in Protest of Federal Data-Grab

When Edward Snowden publicly disclosed that tech giants such as Apple, Google, Microsoft, and Facebook were aiding the government to spy on people in a project dubbed PRISM, some people were quick to look for alternative services that promise end-to-end privacy protection. So when Snowden invited the press to a tell-all press conference in Moscow using the email account “edsnowden@lavabit.com,” the service was quick to garner the attention of the public.  If Snowden uses the service, it must offer security perks, right?  Unfortunately, the spotlight on Lavabit also caught the attention of the government.  And now Lavabit has gone offline for... more »
No thumbnail available

How Can We Monetize The Internet Of Things?

By 2020, it is expected that there will be 30 billion internet connected devices in use.  Which simply means that the Internet of Things will soon be a fully blown trend.  But if you’re not familiar with IoT, you need to understand how the Internet of Things aims to makes sense of all the data produced by these Internet-connected devices.  The data can be used to better understand the needs or wants of consumers, and even predict their next moves based on their history or places visited, items purchased, books read, programs watched and so on. As we move closer and... more »
IBM Alliances Shaking Up Industry, Promise New Generation Products for Users

IBM Alliances Shaking Up Industry, Promise New Generation Products for Users

At IBM Edge in June, when Ambuj Goyal spoke about how IBM had to be an open systems company "because today no one company can do anything" I, and I think most listeners, thought he meant that by incorporating open standards into StorWize, WebSphere, and other IBM middleware, IBM was encouraging third parties to build tools and applications on top of those base platforms. And that is what is happening, in part. Since then however, that message has taken on a much larger meaning as IBM has announced two major alliances, the first with EMC subsidiary Pivotal to put WebSphere on... more »
Hybrid Storage is Disrupting the IT Landscape

Hybrid Storage is Disrupting the IT Landscape

The Internet of Things is driving demand for cost-effective storage solutions that deliver both capacity and performance, according to Rob Commins, the vice president of Tegile. The executive told us that his company’s hybrid arrays marry the benefits of solid-state and traditional disk to “reduce capacity requirements while driving performance integrity.” Tegile’s value proposition has not gone unnoticed by enterprises. The vendor doubled its revenue in the last three months, an unprecedented growth rate that earned it an additional $35 million in funding from Meritech Capital Partners, August Capital, SanDisk and Western Digital Capital. The latter is a subsidiary of the... more »

Premium Research

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.

- Brian Gracely

Wikibon and theCUBE attended Red Hat Summit 2016 in San Francisco. Get analysis of the announcements, partnerships and community programs from Red Hat.

- Brian Gracely

Wikibon and theCUBE attended DockerCon 2016 in Seattle. Get analysis of the announcements, partnerships and community programs from Docker.

- Brian Gracely

Wikibon looks at the evolution of PaaS and Container platforms, and evaluates the critical architectural criteria that should be considered by CIOs, Enterprise Architects, Developers and Operational teams.

- Ralph Finos

Based on market conditions that we have observed over the past year and the recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM, we expect that public cloud spending will continue to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 (19% CAGR). Each public cloud segment will have rapid growth rates: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR) during this period. How big will public cloud be? By 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.