Maria Deutscher
Latest from Maria Deutscher
IBM Storage Sales Chief Says Flash is Driving Value Beyond IT
Enterprise adoption of flash is accelerating due to an exponential rise in data volumes, IBM vice president of global storage sales Sebastian Krause told SiliconAngle founder John Furrier and Wikibon’s Dave Vellante at Edge 2013. He hopped into theCube between keynotes to discuss the state of the market and outline IBM’s billion dollar vision for solid-state ...
ServiceNow Nabs Performance Analytics Firm Mirror42
ServiceNow announced this week that it has bolstered its cloud-based IT service management (ITSM) platform with the acquisition of Mirror42, a Dutch startup that specializes in performance tracking. Terms of the acquisition were not disclosed, but ServiceNow promised to release more details in conjunction with its second quarter earnings call on July 31. Mirror42’s flagship ...
Data Scientist Salaries Increasingly Lucrative, Especially for Foreign-born Analysts
The Internet of Things is driving up the demand for data scientists, but professionals who possess the skills to turn data into tangible business value are few and far between. The latest report from Burtch Works shows that salaries in the field of analytics are skyrocketing as a result. The Evanston, Illinois-based executive recruiting agency ...
NSA’s Definition of “Relevant” Could Have Major Implications for Consumers
We’ve recently learned that a secret court changed the legal definition of the word “relevant” to further National Security Agency’s domestic surveillance efforts. Wikibon Principal Research Contributor Jeff Kelly discussed the ruling and its implications in a recent interview on SiliconAngle NewsDesk with Kristin Feledy. Jeff says that the government started snooping on American citizens ...
Dell Privatization Endorsed by Advisory Firms
Institutional Shareholder Services (ISS) told shareholders to support Michael Dell and Silver Lake Management’s $13.65-per-share buyout proposal in a note sent out this morning. Glass Lewis and Egan-Jones Proxy Services, two other prominent advisory firms, also endorsed the bid in separate statements issued a few hours later. “After evaluating the risk of accepting the offer…ISS ...
Automation is the Key to Effective Backup and Recovery
Preplanning and automation are essential for successful backup and recovery, especially in SMB environments where IT departments are often spread thin. Scott Lowe, Founder and Managing Director of The 1610 Group, outlined the roadmap for effective disaster recovery (DR) in a recent entry on the Wikibon blog. According to Lowe, a sizable portion of organizations ...
Fancy Follows Fab’s Lead, Attracts More Celeb Support for New Age Retail
The Fancy, a New York-based social commerce startup that pegs itself as “part store, blog, magazine and wish list,” nabbed $27 million in funding from American Express, billionaire Len Blavatnik and the one and only Will Smith. The round brings the firm’s total funding to $53 million. American Express president Edward Gilligan is joining The ...
Security Took Center Stage at Cisco Live
Of the 625 sessions at the recently concluded Cisco Live gathering in Orlando, Florida, approximately 100 focused on network security. A few of these seminars were hosted by John Stuppi, a senior engineer at Cisco’s Security Research and Operations unit who discussed the company’s efforts to harden client environments and combat security threats. Stuppi participated ...
Apple at a Crossroads on App Store’s 5th Anniversary
Apple loyalists have reason to celebrate this week: the consumer electronics giant decided to mark the fifth anniversary of the App Store by making at least nine popular apps free. The Verge reported that the complimentary titles include games such as Infinity Blade II, Superbrothers: Sword and Sworcery EP, Where’s My Water?, Badland and Tiny ...
Android’s Achilles’ Heel Poses a Major Threat to Users
Researchers from Bluebox Security have discovered a vulnerability that leaves 99 percent of all Android devices exposed to malware. SiliconANGLE Contributing Editor John Casaretto discussed the findings in a recent interview with NewsDesk host Kristin Feledy. Android uses cryptographic signatures to verify that application updates originate from developers. John says that the exploit Bluebox uncovered ...