Remove AWS Remove Innovation Remove Underperforming Technical Team
article thumbnail

Intercom’s Rich Archbold on how to run less software

Intercom, Inc.

It means reducing choices amongst engineering teams and standardizing technology, so our team can spend as much time as possible delivering value to customers. Our chat covers the origins of Run Less Software, how it has evolved at scale, and how it differs from the equally valid approaches of other engineering teams.

article thumbnail

Tabular: Turning Your Data Swamp into a Data Lakehouse with Apache Iceberg

Clouded Judgement

Typical data lake storage solutions include AWS S3, Azure Data Lake Storage (ADLS), Google Cloud Storage (GCS) or Hadoop Distributed File System (HDFS). In truth, innovations in the past few years are helping evolve the data lake (swamp) into a data lakehouse! A natural question is “why do we have two tiers?

Data 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SaaStr Podcasts for the Week with Byron Deeter, Elliott Robinson, Henry Schuck, and Jason Lemkin

SaaStr

374: ZoomInfo founder and CEO Henry Schuck shares how he built a business from scratch and grew it into one of the most successful IPOs of the 21st century—and what it was really like…the good, the bad, and most of all, the ugly. We’ve all seen AWS and what they’ve done with their platform. It is staggering.

article thumbnail

State of the Cloud 2019: Europa Edition with Alex Ferrara, Bessemer Venture Partners (Video + Transcript)

SaaStr

Before I joined the venture capital industry many years ago, I was a software developer, and I worked for a startup around the 2000 time period. Retail was mentioned twice, that’s it, and AWS was mentioned 78 times, so it’s probably not surprising that they’re doing this. I think it’s a really staggering stat.

Cloud 113
article thumbnail

The Sendgrid Journey: Scaling From Growth Stage to $2B Acquisition in 4 Years (Video + Transcript)

SaaStr

We collectively as a company were fortunate in doing all those things and, boy, was it a heck of a team effort, and it was a lot of fun. We had created an incredible brand with developers, in particular, and created developer love for what we did and the product. ” I didn’t do all those things. I won’t lie.

Scale 155
article thumbnail

Authentication: Methods, Protocols, and Strategies

Frontegg

In reality, many devices and computing systems have weak or ineffective authentication, or authentication is not properly configured by administrators, resulting in severe security risks. Secure authentication mechanisms are necessary to enable easy development, prevent accidental data exposure, and protect against cyber attacks.

article thumbnail

10 Years In Tech

Outseta

What I’m hoping this post provides is an objective look at the world of technology start-ups—the good, the bad, and the ugly. Before I lived it, I thought of the tech world as being very business oriented—a place owned by analytical types and developers writing rigid blocks of code that looked like gibberish to me.