As we have grown substantially over the past two years. We are often asked who (even) is GigaOm, what the company does, how it differentiates, and so on. These are fair questions—many people still remember what we can call GigaOm 1.0, that fine media company born of the blogging wave. We’ve been through the GigaOm 2.0 “boutique analyst firm”...
2w
Traditionally we have taken the approach that we trust everything in the network, everything in the enterprise, and put our security at the edge of that boundary. Pass all of our checks and you are in the “trusted” group. That worked well when the opposition was not sophisticated, most end user workstations were desktops, the number of remote users...
Jul 2022
I’m not going to lie. As I sit on a plane flying away from Valencia, I confess to have been taken aback by the scale of Kubecon Europe this year. In my defence, I wasn’t alone the volume of attendees appeared to take conference organisers and exhibitors by surprise, illustrated by the notable lack of water, (I was told) t-shirts and (at various points)...
Jun 2022
Over the last couple of years, ransomware has taken center stage in data protection, but very few people realize it is only the tip of the iceberg. Everybody wants to protect their data against this new threat, but most solutions available in the market focus just on relatively quick recovery (RTO) instead of detection, protection, and recovery. In...
Apr 2022
Over the last couple of years, ransomware has taken center stage in data protection, but very few people realize it is only the tip of the iceberg. Everybody wants to protect their data against this new threat, but most solutions available in the market focus just on relatively quick recovery (RTO) instead of detection, protection, and recovery. In...
Apr 2022
Over the last couple of years, ransomware has taken center stage in data protection, but very few people realize it is only the tip of the iceberg. Everybody wants to protect their data against this new threat, but most solutions available in the market focus just on relatively quick recovery (RTO) instead of detection, protection, and recovery. In...
Mar 2022
The Low-Power Wide-Area Network (LPWAN) spectrum does not require providers to have a telecommunications license. Being able to operate without a license significantly lowers the financial and logistical barrier to entry. It also opens the door to different approaches to provide Internet of Things (IoT) connectivity. In their report, “Gigaom Radar...
Feb 2022
When the Skipton Building Society, headquartered in northern England, needed to expand its capacity without adding headcount, it conducted an analysis of where it might automate certain operations. As one of the largest building societies in the UK, it provides a range of financial services, such as savings, mortgages, and insurance. Daryl Foster,...
Feb 2022
Software development teams are increasingly focused on identifying and mitigating any issues as quickly and completely as possible. This relates not only to software quality but also software security. Different organizations are at different levels when it comes to having their development teams and security teams working in concert, but the simple...
Jan 2022
For a market segment as stable as application performance monitoring (APM), for individual vendors—even mature established vendors—to stand out requires a unique approach or feature set. At the very least, APM tools must now keep tabs on applications running in myriad locations, whether on-premises, on public or private cloud platforms, distributed...
Jan 2022
Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.
Get Inoreader