Top Stories

Ed Snowden’s Email Provider Shuts Down Amid Gov’t Probe

Ed Snowden’s Email Provider Shuts Down Amid Gov’t Probe

Lavabit, a privacy-centric email provider that was dragged into the media spotlight after Edward Snowden used its service to contact journalists, has shut down in an effort to avoid handing user data over to the government. SiliconANGLE Contributing Editor John Casaretto discussed the news in a recent interview with NewsDesk host Kristin Feledy. John says that Lavabit founder Ladar Levison chose to halt operations because he didn’t want to become complicit in what he called “crimes against the American people.” The most likely reason behind’s Levinson reluctance to provide further explanation is that as a person of interest in an ongoing... more »
How Wearable Tech Will Take The Enterprise By Storm : Google Glass, iWatch and Beyond

How Wearable Tech Will Take The Enterprise By Storm : Google Glass, iWatch and Beyond

Wearable tech is all the rage these days, with much of the talk about these devices centring on their use as entertainment and lifestyle aids. But there are many exciting potential use cases for wearable technologies in the enterprise as well – so exciting in fact, that some observers are saying that enterprise adoption is all but inevitable, and will usher in a new era of "Bring your own wearable device," or "BYOWD", that'll only accelerate as these devices become more widespread. Devices such as Google Glass, Pebble, Fitbit Flex and the rumored Apple iWatch are gadgets that clip around your... more »
Famous Lefties in Tech: Bill Gates + More

Famous Lefties in Tech: Bill Gates + More

Lefties, Southpaws, Sinistral -  these are just some terms that describes a person who dominantly uses their left hand.  Funny how when someone learns that you’re a lefty they get a surprised look on their face, like they just saw an endangered species, or an alien.  You can’t blame them though, it’s not often you come across a leftie since they only make up 10-15 percent of the population.  So yes, we are a special breed.  And yes, if you haven’t figured it out yet, I am a leftie. It’s hard to live in a world where almost everything is made... more »
Mega Working on Encrypted Email Service, Asks Others to Take Privacy Seppuku Pledge

Mega Working on Encrypted Email Service, Asks Others to Take Privacy Seppuku Pledge

Last week encrypted email service provider Lavabit announced they were shutting down.  While the subject of the summer has been Edward Snowden and the documents he has leaked out, what many people may not be aware of is that several federal investigations have been ongoing.  Snowden’s email account of record was with Lavabit, a secure email service provider and the CEO responded (without responding in a way) and made the statement that the service was shutting down, and was bound to a gag order on what the government is asking of the company in the course of their investigation.  Not... more »
The Pirate Bay Marks Ten Years with Release of PirateBrowser to Fight "Censorship"

The Pirate Bay Marks Ten Years with Release of PirateBrowser to Fight "Censorship"

As mentioned late last week, The Pirate Bay held a giant party out in Stockholm over the weekend to mark its tenth anniversary.  There were times when rightfully so, many people doubted the site would be around after ten years.  So Big Pirate Bash - but they didn’t let it stop there, no.  The Pirate Bay released a new browser that is dedicated to privacy and access.  The Pirate Browser is designed with The Pirate Bay’s history in mind.  It allows access to the site to those countries where the site is blocked.  You see the governments in certain countries... more »
How Ethical is Your Big Data?

How Ethical is Your Big Data?

Imagine this scenario: you go for a routine check-up at the hospital, but instead of the doctor giving you the all clear sign, he informs you that you've an extremely aggressive medical condition - one so aggressive, that even the doctors haven’t encountered it before.  The medical team attempts to treat your condition, but unbeknown to you, they also take a biopsy, cultured the tissue sample and performed medical experiments on you. Thanks to these 'experiments', science goes on to find dozens of cures for numerous serious illnesses and conditions, but unfortunately they were unable to find a cure for you.... more »
Security Recap: IPOs and Cybercriminals

Security Recap: IPOs and Cybercriminals

The U.S. government is getting serious about cybersecurity. Earlier this week the White House published a preliminary list of of incentives for critical infrastructure companies that participate in the Department of Homeland Security’s nation-wide security program. SiliconANGLE Contributing Editor John Casaretto views the development as a positive step towards comprehensive cybersecurity legislation. At the same time, he believes that the government will have to offer a broader set of incentives to attract companies from other sectors that are also facing increasing threats from hackers. Retail and finance are two of the industries that fall under this category. Five Eastern European nationals were... more »
Aerospike Fast-tracks Madvertise Ad Impressions to 25 Billion Monthly

Aerospike Fast-tracks Madvertise Ad Impressions to 25 Billion Monthly

The success of tablets and smartphones has led to a change in the ways advertising agencies target mobile users. The broad popularity of mobility is creating a tremendous opportunity for mobile advertising and mobile developers. Gartner projects mobile ad revenues across Western Europe are projected to grow from $1.6 billion to $1.9 billion and in Germany alone it is projected to jump from $79 million in 2012 to $135 million in 2013. Madvertise, one of the most important platforms in mobile advertising in Europe, offers the widest range of mobile websites and applications for Europe. Madvertise media company is specializing in... more »
No thumbnail available

"Most Dangerous Man in Wireless" Says Apple is Not Key to T-Mobile's Success

Dropping the f-bomb and critiquing data caps that limit porn viewing on smartphones, T-Moblie CEO John Legere’s last Consumer Electronics presentation could be called reckless. According to Roger Cheng of CNet,  this approach is matched by a thorough an aggressive new business strategy that shakes up the industry and makes Legere the “Most Dangerous Man in Wireless.” T-Mobile U.S. reported the greatest increase in customer growth in four years with 1.1 million customers during the second quarter, including 678,000 for its primary T-Mobile and MetroPCS brands. Cheng notes that this is the highest customer gain T-Mobile has had in four years.... more »
Feds Bust Largest Hacking Operation in US History

Feds Bust Largest Hacking Operation in US History

Five Eastern European men have been charged with operating a global hacking network that siphoned hundreds of millions of dollars from top financial institutions. SiliconANGLE Contributing Editor John Casaretto offered his insights into the operation in a recent Q&A on NewsDesk. John says that the scheme was orchestrated by four Russian nationals, a Ukrainian man and a Miami resident by the name of Albert Gonzalez. The group successfully infiltrated Nasdaq stock exchange, Citibank, PNC Bank, Heartland Payment Systems, 7-Eleven, JCPenney, Hannaford Brothers and a number of other companies that were not named. According to John, two of the men that allegedly participated... more »

Premium Research

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.

- Brian Gracely

Wikibon and theCUBE attended Red Hat Summit 2016 in San Francisco. Get analysis of the announcements, partnerships and community programs from Red Hat.

- Brian Gracely

Wikibon and theCUBE attended DockerCon 2016 in Seattle. Get analysis of the announcements, partnerships and community programs from Docker.

- Brian Gracely

Wikibon looks at the evolution of PaaS and Container platforms, and evaluates the critical architectural criteria that should be considered by CIOs, Enterprise Architects, Developers and Operational teams.

- Ralph Finos

Based on market conditions that we have observed over the past year and the recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM, we expect that public cloud spending will continue to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 (19% CAGR). Each public cloud segment will have rapid growth rates: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR) during this period. How big will public cloud be? By 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.