Top Stories

Mexico Has Their Head In The Cloud

Mexico Has Their Head In The Cloud

Ask most Americans what they know about the land just across our southern border and chances are they will tell you about out-of-control drug related violence, a governmental structure that is highly corrupted and a less than stellar physical infrastructure. As one who has spent an extended period of time in Mexico, it would be hard for me to refute any of those claims. But if recent reporting is any indicator, Mexico has an ace up their sleeve. As Thomas Friedman reported in the New York Times, “Something happened here. It’s as if Mexicans subconsciously decided that their drug-related violence is... more »
Apple at a Crossroads on App Store’s 5th Anniversary

Apple at a Crossroads on App Store’s 5th Anniversary

Apple loyalists have reason to celebrate this week: the consumer electronics giant decided to mark the fifth anniversary of the App Store by making at least nine popular apps free. The Verge reported that the complimentary titles include games such as Infinity Blade II, Superbrothers: Sword and Sworcery EP, Where's My Water?, Badland and Tiny Wings, as well as Traktor DJ Day One, Over, How to Cook Everything, and Barefoot World Atlas. None of these applications have been free before. Apple has yet to acknowledge that the offer is tied to the July 10 App Store anniversary, but it’s highly likely that... more »
No thumbnail available

Making Medical Data Better Data

In just over a week, the team here at SiliconANGLE will be setting off for Cambridge, Massachusetts for the 7th Annual MIT Chief Data Officer and Information Quality Symposium held on the MIT campus. The theme this year is ‘Big Data Demands Good Data’. In preparation for the event, we will be presenting a synopsis of some of the important topics scheduled to be covered in conjunction with other academic and real-world applications that apply. One of the first sessions, to be presented by Dr. David Levine, Vice President of Informatics/Medical Director of Comparative Data and Informatics for United Healthcare, will... more »
Fight Against Anonymization Services, MasterCard and Visa Block Payment to VPN Providers

Fight Against Anonymization Services, MasterCard and Visa Block Payment to VPN Providers

Credit card companies have been seen lately taking up the vanguard of the fight against piracy. MasterCard and Visa are said to have begun to refuse payment to any provider of VPN connections--in the wake of their refusal to work with file sharing sites. Following the introduction of restrictions on the file-sharing services and strongly encouraged by the U.S. government, MasterCard and Visa have begun to take action against the VPN-providers. The TorrentFreak blog reported that a Swedish provider of payments, Payson, was instructed to not process payments, after having received appropriate instructions from the operators of credit systems. A VPN (virtual... more »
Ask DevOps: Why are software development task estimations regularly off by a factor of 2-3?

Ask DevOps: Why are software development task estimations regularly off by a factor of 2-3?

I came across an interesting question on Quora which asked about why software development task estimations are regularly off by a factor of 2-3.  The question goes on to ask if it’s the developer’s fault, a management issue, bad methodology or lack of methodology or if it’s ingrained in the nature of the process. There are some very interesting answers on Quora but the best answer may have been described by Michael Wolfe, a startup founder.  He explained that software development is like hiking from San Francisco to Los Angeles and estimate that you’ll reach your destination in 10 days.  It... more »
No thumbnail available

Apple Offers Expensive iOS Apps and Games for Free

Apple begins the week in a generous spirit, offering free apps and games at the App Store. Just two of several freebies include Traktor DJ (regularly $20) and Infinity Blade II (regularly $7). Apple has not formally launched a promotion campaign with these giveaways, but several reporters like Sam Byford of TheVerge believe these offerings may be in conjunction with the upcoming App Store Anniversary on July 10th. Since its launch in 2008, the App Store has received over 50 billion downloads. In an earlier commemorative promotion, Apple awarded the user that made the 50 billionth download a $10,000 gift card.... more »
How To Ditch Google: Alternatives For Every Google Product Known To Man

How To Ditch Google: Alternatives For Every Google Product Known To Man

Of all the companies implicated in the NSA – PRISM scandal, Google's involvement has to be the most worrisome. Reason being, practically 99% of the world's internet users (if we exclude China) must be using at least one Google service or product, and in most cases they'll be using dozens. Be it search, email, news, instant messaging, social networking or even books, Google's services are used by millions of people the world over. I'll give Google some credit here – the reason so many millions upon billions of people use their services is because they're so damn good at what they... more »
How DevOps Works at Rafter

How DevOps Works at Rafter

Rafter Inc, formerly known as Bookrenter.com is the first online textbook rental service. The company started with a group of college graduates and has transformed to a large company in the last six years. Here we have insights from Chris Williams, Co-founder of Rafter Inc on how his company is putting DevOps at work. Williams manages the DevOps department and oversees infrastructure automation, deployment and release processes, and platform availability. As Rafter Inc. started flourishing with growing engineering and product teams, more number of applications hosted on hardware, and developers wanting to use new types of application frameworks, programming languages, databases,... more »
Android’s Achilles’ Heel Poses a Major Threat to Users

Android’s Achilles’ Heel Poses a Major Threat to Users

Researchers from Bluebox Security have discovered a vulnerability that leaves 99 percent of all Android devices exposed to malware. SiliconANGLE Contributing Editor John Casaretto discussed the findings in a recent interview with NewsDesk host Kristin Feledy. Android uses cryptographic signatures to verify that application updates originate from developers. John says that the exploit Bluebox uncovered allows attackers to bypass this verification mechanism and modify an application without breaking its unique signature. The severity of the compromise depends on the application. While an arbitrary app may or may not give attackers access to personal data, a pre-installed application with a platform key can... more »
No thumbnail available

Are Mobile Users to Blame for "Spying" Motorola ToS?

Before the nation celebrated Independence Day last week, Motorola revealed a new ad for the Moto X, its upcoming flagship smartphone in collaboration with Google.  The ad boasts of a smartphone that users can design themselves.  Not really sure if Motorola meant a smartphone that is unique to each users since they would be designing it, or its just a clever marketing tactic referring only to the customization of the handset's UI or wallpaper. However, one thing remains clear, Motorola wants consumers to be “free.” Free from what?  There's no telling, but it’s certainly not freedom from the government’s spying eyes... more »

Premium Research

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.

- David Vellante

In the spring of 2016 we began an initiative to organize a group of CxOs to discuss the issue of cyber security. One thing we’ve learned about the topic of security is it’s hard to fake. We’re not security technology experts. As such we decided to focus on business issues. We observed heightened activity around […]

- Peter Burris

Leading digital companies are using simple top-level frameworks for setting digitization priorities. At the center of the approaches we've seen are three questions: What do we want to do better; who are we going to engage; and how are we going to institute the digital capabilities.

- George Gilbert

Enterprises must navigate the universe of big data applications by recognizing that application platforms will alternately empower and constrain enterprises along a path of ever more sophisticated applications. Data lakes, intelligent systems of engagement, and self-tuning systems of intelligence all build on each other in terms of capabilities. But the underlying platforms will evolve in a cycle of simplicity, complexity from adaptive stretch, and simplicity again via a platform refresh.

- George Gilbert

Big data products and workloads remain too immature for standard benchmarks capable of providing truly comparable results. Users that need benchmarks for contracting or comparison purposes should run their own stylized workloads based on their intended usage scenarios.

- Ralph Finos

Users considering public cloud for business and IT workloads should evaluate the types of use cases and workloads that have wide successful deployment in the public cloud today. In order to help users to better understand the customers and workloads being served in the public cloud today, Wikibon examined the brief descriptions of approximately 650 customer solution stories on the Amazon Web Services (AWS) website and classified each according on a number of characteristics. This research reveals some interesting insights about the public cloud leader’s business, and therefore about public cloud utilization generally.

- David Floyer

The Wikibon premise in this research is that this converged environment is a win-win environment for both vendors, ISVs and enterprise IT. Testing of the converged system solution is more robust, and the reduction in the number of solution types significantly lowers testing and installation costs for the vendor. ISVs can lower the cost of deployment, deliver application value faster, and drive additional upgrade value much faster. Converged enterprise IT systems (private clouds) are more agile, more reliable, more secure and have the similar costs to public clouds.

- Brian Gracely

Wikibon looks at the emerging Cloud-native application architectures. This research focused on the scope of microservices, the domains of interaction between services, and how data services and sources are changing with these new applications.

- Brian Gracely

Faced with the choices of modernizing existing applications or starting new projects, IT organizations have many options. Wikibon looks at the vast number of options today, with a methodology to evaluate choice vs. risk.

- David Floyer

There are no enterprise organizations that have married the business, digital creativity and IT as seamlessly as Weta Digital.