Top Stories

MongoDB Raises $150M, Now the Most Funded Big Data Startup

MongoDB Raises $150M, Now the Most Funded Big Data Startup

Riding the Big Data tidal wave, MongoDB has raised $150 million in financing to accelerate its global expansion. The round was led by an unnamed financial services company and attracted industry heavy hitters such as Salesforce and Intel. Altimeter Capital, T. Rowe Price Associates and Sequoia Capital also participated, bringing the NoSQL vendor’s total funding to a record $213 million. Now the most valuable startup in New York, MongoDB offers a highly scalable document-oriented database for analytical and fast-changing operational workloads. The platform has been downloaded over 5 million times, and deployed by SAP, MTV Networks, Foursquare and other big name... more »
Splunk Support of AWS Cloud Designed to Bridge the Data Divide

Splunk Support of AWS Cloud Designed to Bridge the Data Divide

Splunk enables organizations to monitor, search, analyze, visualize and act on massive streams of real-time and historical machine data. Splunk Storm, which is aimed at companies who develop their applications in the public cloud and provide for infrastructure services such as AWS, Heroku, Google App Engine, or Rackspace, uses Amazon EC2 as its infrastructure, and also uses Amazon Elastic Block Store (Amazon EBS), Amazon Elastic Load Balancing (Amazon ELB), AWS Identity and Access Management (IAM). Extending the Amazon cloud reach, Splunk announced a free analytics-as-a-service product based on the Amazon Web Services cloud at the Splunk Conference 2013. Organizations can now... more »
With Eyes Set on Mobile, Pivotal Picks Up Xtreme Labs

With Eyes Set on Mobile, Pivotal Picks Up Xtreme Labs

Pivotal, the open cloud venture that spun off EMC and VMware last year, has made its first acquisition this week in a milestone move to enter the mobile scene. The firm announced on Wednesday that it has signed an agreement to buy Xtreme Labs, a privately-held development studio based in Toronto, Canada. No financial details were disclosed, but an anonymous tipster told AllThingsD’s Kara Swisher that the deal is valued at over $65 million. Founded in 2007, Xtreme boasts an impressive client list that includes Facebook, Twitter and  Fortune 500 brands in the retail, entertainment and financial services industries. Pivotal plans... more »
Can Splunk Make the Nation More Secure? | #splunkconf

Can Splunk Make the Nation More Secure? | #splunkconf

Mark Seward, Senior Director of Security and Compliance Marketing with Splunk, talked with John Furrier and Dave Vellante at Splunk.conf 2013 in Las Vegas, covering the data management platform and various security issues. Furrier started the interview by pointing out that a lot of people are using Seward's product for security and compliance reasons, and asked the security angle for this conference. "I've seen that liberating feeling coming over people. What is liberating is that they're able to answer questions with what is usually considered to be exhaust gas in the business - the exhaust gas of data that comes out of... more »
No thumbnail available

SmartWorld Weekly: New Smart Home Solutions, Cools Toys + More

If you missed this week’s SmartWorld Series, here’s your chance to catch up on the exciting developments happening in the connected world.  Each week, we round up the best of apps and services for health and fitness, smart homes, smart cars and anything related to the Internet of Things. This week’s SmartWorld Series features new smart home solutions, ways to keep track of your mood, new smart vehicles, and cool connected toys. Newest Smart Home Solutions for You + Pets   SmartHome Monday featured WigWag, a wireless device that help you control your automated home, Nest’s effort to expand and deliver a smart smoke... more »
Adobe Gives Hack Victims Free Credit Watch : 3 Quick Tips to Secure Your Data

Adobe Gives Hack Victims Free Credit Watch : 3 Quick Tips to Secure Your Data

Hackers are getting sneakier.  Once upon a time, they were only after one thing: credit/debit card information to use for financial gains.  Now, they are hitting service providers hard by attacking product source codes.  Adobe is the latest victim, losing both customer data and source code to a hacker attack.  Read our initial coverage here. Adobe Chief Security Officer Brad Arkin revealed that its security team discovered sophisticated attacks in its network, which involved illegal access to customer account information as well as source code for numerous Adobe products.  Though it hasn’t been proven, Adobe believes that the attacks are related. “Our... more »
Payback for Payback - 13 Anonymous Members Indicted for Anti-Piracy Retaliation DDoS Attacks

Payback for Payback - 13 Anonymous Members Indicted for Anti-Piracy Retaliation DDoS Attacks

13 alleged memebers of the hacktivist group Anonymous were indicted by a federal grand jury, as described in an 28-page indictment unsealed Thursday in an Alexandria, Virgina US district court.  The indictment describes a series of online attacks in an that were launched under the banner of "Operation Payback".  The attacks were distributed denial of service attacks (DDoS) and started in 2010 as retaliation for actions made against the Swedish torrent site The Pirate Bay.  The Pirate Bay had been shutdown in a campaign against piracy and Anonymous fired back, attacking the Motion Picture Association of America (MPAA), the Recording... more »
NaviSite Revamps DaaS Offering

NaviSite Revamps DaaS Offering

NaviSite, a provider of enterprise-grade cloud hosting and application management services, has enhanced its desktop-as-a-service offering to accommodate businesses that don’t have the budget for a dedicated environment. With the addition of remote desktop services and a remote application delivery tool, the platform allows customers to adopt multi-tenancy without compromising on performance or security. Admins can set access controls at the desktop level, or enforce corporate policy at the application layer to simplify provisioning. NaviSite says that this functionality enables organizations to meet the needs of remote and mobile workers that require rapid access to cloud resources. Other selling points of the... more »
5 Interviews Worth Watching from Splunk.conf2013 : Exclusive Videos

5 Interviews Worth Watching from Splunk.conf2013 : Exclusive Videos

Splunk.conf2013 has wrapped this week, and one thing is clear - Splunk has positioned itself well to transition beyond machine log data. Looking to make its solution more broadly known for its ability to support generalized Big Data needs, Splunk is becoming more applicable for the enterprise. Customers use Splunk's platform for marketing-related data and sales data, showcasing all the right partners to prove its ecosystem worthy. Lets checkout some of the great interviews that we had on our exclusive coverage of #splunkconf13 on theCUBE. . How Cloud and SaaS Power Ping Identity’s Growth #splunkconf . theCUBE hosts John Furrier and Dave Vellante welcomed Beau... more »
Adobe Hacked - Lost Source Code and 2.9 Million Customers Financial Info

Adobe Hacked - Lost Source Code and 2.9 Million Customers Financial Info

Brad Arkin, Adobe's Chief Security Officer stated on the Adobe blog late yesterday that hackers had broken into their computer network and had taken both customer data and software source code that could be used to launch hidden attacks. "Attackers removed from our systems certain information relating to 2.9 million Adobe customers, including customer names, encrypted credit or debit card numbers, expiration dates, and other information relating to customer orders" The hackers also walked off with Adobe's source code for its biggest product - Adobe Acrobat product that is widely used for creating PDF files, they also grabbed source code for ColdFusion... more »

Premium Research

- David Floyer

Industrial IoT, the largest segment of the Internet of things (IoT) with the highest potential value, will require a deep integration between modern IT (Information Technology) and OT (Operations Technology). Modern IT technologies, to be truly extensible to OT, will need a hybrid cloud approach, with by far the majority of data and processing residing at the so-called "Edge". Architectures and software written by industrialists for industrialists, such as GE Predix, are showing how that can work.

- George Gilbert

The big data arena is at a crossroads. Use cases and tools are proliferating faster than most big data teams are gaining experience. In establishing the big data business capabilities required to cut through the complexity, CIO’s must balance the accessibility of integration of traditional SQL DBMS’s versus speed of innovation in the mix and match open source big data ecosystem.

- Peter Burris

In the big data domain, businesses are trying to solve complex problems with complex and novel technology -- and often failing. Simplifying the packaging of big data technologies will streamline big data pilots and accelerate big data time-to-value. CIOs looking to establish differentiating big data capabilities need to consider Single Managed Entities to help solve the complexity problem.

- David Floyer

Oracle M7 technology is meeting or exceeding the announcement performance claims against previous generation. Even taking very conservative assumptions, the business case for migration from T5 to T7 servers is good. Wikibon concludes that for Oracle software and the servers they run on, the adoption of M7 technology (and T7 server technology) is best practice for these high value compute areas.

- David Floyer

The premise tested in this research is that high value applications and software should be run on more capable converged performance-optimized infrastructure, even when they constitute a small proportion of the total workload. In contrast, cost-optimized infrastructure will save on short-term hardware costs, but will incur much higher overall costs long-term. The conclusion strongly recommends IT executives adopt a default of performance-optimized converged infrastructure for all mixed workloads when even a small proportion includes high-cost software and/or high-value applications.

- George Gilbert

Big data pros need to identify which data feedback loops in their machine learning applications can deliver sustainable differentiation through network effects. Starting early is critical because getting to scale is likely to create the "winner takes most" competitive dynamics that have become so common in tech industries. The biggest sin is to wait for the tooling to become automated enough for all competitors to jump in.

- Ralph Finos

The public cloud competitive environment remains turbulent, but sectors show signs of crystallizing a longer-term market structure.. SaaS remains turbulent with SaaS vendors successfully gaining share vs. incumbent licensed software providers who must migrate their core products to cloud-friendly offerings and/or acquire native SaaS applications to shore up their applications leadership positions. Public cloud IaaS segment leadership is crystallizing to a handful of viable providers as a function of scale requirements. PaaS is just formulating and finding its way, but is likely to gravitate towards a wide variety of development models suited for different application types and public cloud platforms.

- David Floyer

For enterprise executives trying to achieve aggressive RPO and RTO SLAs , Wikibon believes that batch backup appliances (PBBAs) will give way to real-time, continuous data protection systems that aggressively support very large memory application memory. Practitioners requiring close to RPO zero and aggressive RTO SLAs should plan for an integrated data protection approach that effectively eliminates the concept of storage-led backup and shifts thinking to a application-led virtual point-in-time recovery model. The database and file system vendors will be the predominant suppliers of this technology, and understanding their roadmaps and commitment to support application-led recovery strategies is crucial to both database and data protection technology selection.

- George Gilbert

Mainstream enterprises are beginning to deploy machine learning applications that add differentiation to traditional products and services. But the complexity of their big data infrastructure is becoming a problem. Big data pros need to deploy a digital business platform (DBP) to support modern applications and then extend the DBP to machine learning applications.

- Peter Burris

IT shops that want to achieve modern IT status will have to address the "IT iron triangle" constraining transformation.