Top Stories

No thumbnail available

Bottlenose Nets $3.6 Million in First Round of Funding

Bottlenose announced this week that it has closed a $3.6 million Series A financing round led by ff Venture Capital. Existing backers Lerer Ventures, Transmedia, Advancit, Stage One Capital and Social Starts also contributed to the funding. Bottlenose operates a social media search engine that aggregates posts from Facebook and Twitter and optimizes results based on users’ points of interest. The cloud-based solution utilizes 16 patent pending natural language and statistical techniques to connect the dots between people, location data and a wide range of other social metrics. Users can visualize their search results using Sonar, Reader and Newspaper, a set of... more »
Just Sim Case & Google: Terrorist Training Camp - SiliconANGLE News Roundup

Just Sim Case & Google: Terrorist Training Camp - SiliconANGLE News Roundup

SIMpatico!   In an update to our previous coverage of the story, a massive SIM card security hole has been fixed by all of the major wireless carriers, following reports that the bug could have allowed criminals to hack into hundreds of millions of cellphones. While no phone is completely secure from attack, the old dependable SIM card was considered safe from most attacks.This particular hack took advantage of a previously undiscovered hole in SIM technology. The individual who discovered the flaw was scheduled to publicly demonstrate the hack on Wednesday at the Black Hat security conference in Las Vegas. He instead announced that... more »
LIVE: Hacking - Only Good When the FBI Does It

LIVE: Hacking - Only Good When the FBI Does It

Updated with full video - see below. Welcome to NewsDesk on SiliconANGLE TV for Friday August 2, 2013. Law-enforcement officials in the U.S. are turning to the use of tools commonly deployed by computer hackers in order to gather intelligence on suspects. Joining us now to share more on these information gathering techniques is SiliconANGLE Contributing Editor John Casaretto. The FBI develops some hacking tools internally and purchases others from the private sector. With such technology, the bureau can remotely activate the microphones in phones running Google's Android software to record conversations, one former U.S. official said. It can do the same to microphones... more »
Converged Efforts in Hadoop, BYOD and Flashy Smartphones

Converged Efforts in Hadoop, BYOD and Flashy Smartphones

The world is becoming more data-intensive every day, and what's managing it all?  A whole new world of software and hardware upgrades have emerged in recent years to address the "data problem," even fostering partnerships in the process.  Long time allies Cisco and NetApp make up the most recent partnership in data management, expanding their jointly developed FlexPod lineup with two cutting edge Hadoop appliances.  Their efforts bring together the best of Cisco and NetApp's switches and storage solutions, making strides in the growing realm of converged infrastructure. Mobile is also benefitting from converged solutions, with the crowdfunding community rising to the... more »
Syncsort Officially on the Prowl for Big Data Partners

Syncsort Officially on the Prowl for Big Data Partners

Syncsort is pushing into the channel with a new partner program for regional systems integrators (RSIs). The Woodcliff Lake, NJ.-based data integration specialist is looking to team up with RSIs that specialize in analytics. “As companies tackle Big Data challenges, the common denominator is finding innovative solutions that drive better business outcomes in less time, with fewer resources and at a lower TCO," stated Josh Rogers the president of Syncsort’s data integration business. "With our Data Integration solutions, RSI partners can add value by helping customers achieve this goal." Syncsort says that RSIs that join its partner program stand to benefit from... more »
All is Not Quiet on Microsoft’s Battle Fronts

All is Not Quiet on Microsoft’s Battle Fronts

Microsoft is facing a number of challenges on a number of fronts.  This post describes some of the challenges and provides some of my thoughts on how Microsoft might address them. The Surface and Windows 8 This week, I was on SiliconAngle’s morning News Desk discussing Microsoft’s truly awful Surface sales figures. The short version is this: Surface has been a colossal failure as evidenced by sales figures of $853 million against write offs of $900 million in excess inventory and almost that much in combined Windows 8 and Surface marketing costs.  In other words, Microsoft spend more trying to sell the... more »
10 Ways to Safeguard your Network During Hurricane Season

10 Ways to Safeguard your Network During Hurricane Season

Axcient, a provider of cloud-based backup solutions, closed out the second month of this year’s relatively quiet hurricane season with a 10-step guide for enterprise disaster preparedness. “When Hurricane Sandy hit the East Coast last Fall, it resulted in $62 billion in damages and economic losses from businesses that were not able to operate because of flooded buildings, power blackouts and damaged communications infrastructure,” said Justin Moore the CEO at Axcient. “However, there were several success stories, where firms had disaster plans in place and were able to leverage cloud-based disaster recovery and business continuity solutions to weather the storm. Dozens... more »
Cornucopia: Coming Soon Hot Food Served to You From A 3D Printer

Cornucopia: Coming Soon Hot Food Served to You From A 3D Printer

Food is one of the fundamental ingredients of life. We cannot go a day without it before experiencing discomfort and the kinds of food we eat and how we eat them are closely intertwined with our cultural practices, physical environments, and personal health. So when we at SiliconAngle heard about 3D printable food, we had to check it out. So, when was the last time you had to prepare a dish you made before, without a precise recipe you perhaps produced something that didn't taste exactly like you expected? Scolars of innovation labs at MIT have developed a new three dimensional printer... more »
AOptix Announces Stratus Client SDK for iOS: Making the Smartphone a Smater Biometric Reader

AOptix Announces Stratus Client SDK for iOS: Making the Smartphone a Smater Biometric Reader

AOptix, Campbell-based provider of intuitive biometric identity verification solutions and wireless communications technology, recently announced the general availability of its SDK for Stratus. AOptix Stratus Client Software Development Kit (SDK) is the hardware and app that transforms the iPhone into a biometrics scanning tool, making identity faster, cheaper and more accurate for teams in defense, finance, health and national, civil ID programs and more. "Biometrics is an important part of security systems," says Kyt Dotson, assistant editor at SiliconAngle. "Bringing it to smartphones is an interesting move for AOptix, but it also means the mobile ability to provide proof-of-id for individuals... more »
No thumbnail available

Assange’s Law – NSA Powers Double Every 4 Years

Well, here comes Julian.  Never one to stand on the sidelines of any global surveillance debate, Julian Assange has emerged yet again to state his opinion.  This time he has emerged with what can only be described as some kind of WikiLeak version of Moore’s law or something, except that instead of CPU speed, he’s talking about the NSA and the power they are increasingly gaining.  The remarks came out of a speech he broadcast at the OHM2013 Observe, Hack, Make conference.  Assange also added that some experts might not have enough perspective about what is going on. "The world is witnessing... more »

Premium Research

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.

- Brian Gracely

Wikibon and theCUBE attended Red Hat Summit 2016 in San Francisco. Get analysis of the announcements, partnerships and community programs from Red Hat.

- Brian Gracely

Wikibon and theCUBE attended DockerCon 2016 in Seattle. Get analysis of the announcements, partnerships and community programs from Docker.

- Brian Gracely

Wikibon looks at the evolution of PaaS and Container platforms, and evaluates the critical architectural criteria that should be considered by CIOs, Enterprise Architects, Developers and Operational teams.

- Ralph Finos

Based on market conditions that we have observed over the past year and the recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM, we expect that public cloud spending will continue to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 (19% CAGR). Each public cloud segment will have rapid growth rates: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR) during this period. How big will public cloud be? By 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.