Gigaom Search - RSS Feed

Search and browse the archives

Latest articles

Achieve more with GigaOm

As we have grown substantially over the past two years. We are often asked who (even) is GigaOm, what the company does, how it differentiates, and so on. These are fair questions—many people still remember what we can call GigaOm 1.0, that fine media company born of the blogging wave. We’ve been through the GigaOm 2.0 “boutique analyst firm”...

Pragmatic view of Zero Trust

Traditionally we have taken the approach that we trust everything in the network, everything in the enterprise, and put our security at the edge of that boundary. Pass all of our checks and you are in the “trusted” group. That worked well when the opposition was not sophisticated, most end user workstations were desktops, the number of remote users...

Retrospective thoughts on KubeCon Europe 2022

I’m not going to lie. As I sit on a plane flying away from Valencia, I confess to have been taken aback by the scale of Kubecon Europe this year. In my defence, I wasn’t alone the volume of attendees appeared to take conference organisers and exhibitors by surprise, illustrated by the notable lack of water, (I was told) t-shirts and (at various points)...

Ransomware: Why It’s Time to Think of it as a Data Management Problem

Over the last couple of years, ransomware has taken center stage in data protection, but very few people realize it is only the tip of the iceberg. Everybody wants to protect their data against this new threat, but most solutions available in the market focus just on relatively quick recovery (RTO) instead of detection, protection, and recovery. In...

Ransomware: Why It’s Time to Think of it as a Data Management Problem

Over the last couple of years, ransomware has taken center stage in data protection, but very few people realize it is only the tip of the iceberg. Everybody wants to protect their data against this new threat, but most solutions available in the market focus just on relatively quick recovery (RTO) instead of detection, protection, and recovery. In...

Ransomware: Why It’s Time to Think of it as a Data Management Problem

Over the last couple of years, ransomware has taken center stage in data protection, but very few people realize it is only the tip of the iceberg. Everybody wants to protect their data against this new threat, but most solutions available in the market focus just on relatively quick recovery (RTO) instead of detection, protection, and recovery. In...

Long Distance, Low-Power WAN Drives IoT Connections

The Low-Power Wide-Area Network (LPWAN) spectrum does not require providers to have a telecommunications license. Being able to operate without a license significantly lowers the financial and logistical barrier to entry. It also opens the door to different approaches to provide Internet of Things (IoT) connectivity. In their report, “Gigaom Radar...

British Lender Increases Efficiency with RPA

When the Skipton Building Society, headquartered in northern England, needed to expand its capacity without adding headcount, it conducted an analysis of where it might automate certain operations. As one of the largest building societies in the UK, it provides a range of financial services, such as savings, mortgages, and insurance. Daryl Foster,...

Security Tools Help Bring Dev and Security Teams Together

Software development teams are increasingly focused on identifying and mitigating any issues as quickly and completely as possible. This relates not only to software quality but also software security. Different organizations are at different levels when it comes to having their development teams and security teams working in concert, but the simple...

APM Solutions Venture into AI and DevOps

For a market segment as stable as application performance monitoring (APM), for individual vendors—even mature established vendors—to stand out requires a unique approach or feature set. At the very least, APM tools must now keep tabs on applications running in myriad locations, whether on-premises, on public or private cloud platforms, distributed...

Discover, share and read the best on the web

Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!