article thumbnail

Tabular: Turning Your Data Swamp into a Data Lakehouse with Apache Iceberg

Clouded Judgement

Typical data lake storage solutions include AWS S3, Azure Data Lake Storage (ADLS), Google Cloud Storage (GCS) or Hadoop Distributed File System (HDFS). In truth, innovations in the past few years are helping evolve the data lake (swamp) into a data lakehouse! A natural question is “why do we have two tiers?

Data 130
article thumbnail

Intercom’s Rich Archbold on how to run less software

Intercom, Inc.

It means reducing choices amongst engineering teams and standardizing technology, so our team can spend as much time as possible delivering value to customers. Our chat covers the origins of Run Less Software, how it has evolved at scale, and how it differs from the equally valid approaches of other engineering teams.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Starting Up In A Downturn with Cloudflare COO and Co-Founder Michelle Zatelyn (Video + Transcript)

SaaStr

So we’re really proud of that and our whole team is really proud of that. And one thing that’s been really cool starting the company 10 years ago in an economic downturn to today, about six months ago Matthew and I and our team took the company public on the New York Stock Exchange. That doesn’t mean it’s easy.

article thumbnail

SaaStr Podcasts for the Week with Tidelift and Cloudflare

SaaStr

Where do most teams go wrong in implementing the role out of their CS strategy? Does Bridget believe CS teams should be involved in the upsell process? Harry Stebbings: Can I ask, if we take that to a practical level, because I totally agree in terms of that career development, and the thriving. What works? What does not work?

article thumbnail

Authentication: Methods, Protocols, and Strategies

Frontegg

In reality, many devices and computing systems have weak or ineffective authentication, or authentication is not properly configured by administrators, resulting in severe security risks. Secure authentication mechanisms are necessary to enable easy development, prevent accidental data exposure, and protect against cyber attacks.

article thumbnail

Q&A with Maria Pergolino, Anthony Kennada, Aaron Ross and Jason Lemkin (Video + Transcript)

SaaStr

And I remember being at that Dreamforce in 2009, which was awful. If something bad happens, you’re going to have to cut your burn, probably. There is one thing, I love this quote and it’s a little bit of a crude quote, not that it’s bad language-. What do you do with that lightly toxic person on your team?

article thumbnail

State of the Cloud 2019: Europa Edition with Alex Ferrara, Bessemer Venture Partners (Video + Transcript)

SaaStr

Before I joined the venture capital industry many years ago, I was a software developer, and I worked for a startup around the 2000 time period. Retail was mentioned twice, that’s it, and AWS was mentioned 78 times, so it’s probably not surprising that they’re doing this. I think it’s a really staggering stat.

Cloud 101