Remove AWS Remove Innovation Remove Underperforming Technical Team
article thumbnail

Intercom’s Rich Archbold on how to run less software

Intercom, Inc.

It means reducing choices amongst engineering teams and standardizing technology, so our team can spend as much time as possible delivering value to customers. Our chat covers the origins of Run Less Software, how it has evolved at scale, and how it differs from the equally valid approaches of other engineering teams.

article thumbnail

Q&A with Maria Pergolino, Anthony Kennada, Aaron Ross and Jason Lemkin (Video + Transcript)

SaaStr

And I remember being at that Dreamforce in 2009, which was awful. If something bad happens, you’re going to have to cut your burn, probably. There is one thing, I love this quote and it’s a little bit of a crude quote, not that it’s bad language-. What do you do with that lightly toxic person on your team?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tabular: Turning Your Data Swamp into a Data Lakehouse with Apache Iceberg

Clouded Judgement

Typical data lake storage solutions include AWS S3, Azure Data Lake Storage (ADLS), Google Cloud Storage (GCS) or Hadoop Distributed File System (HDFS). In truth, innovations in the past few years are helping evolve the data lake (swamp) into a data lakehouse! A natural question is “why do we have two tiers?

Data 130
article thumbnail

Founder’s Guide to Scaling Applications: When to Build, When to Buy and What Breaks by Algolia Co-founder (Video + Transcript)

SaaStr

When it comes to seamlessly scaling your applications, a top-notch engineering team will be your foundation. Julian Lemoine, Co-Founder, and CTO of Algolia will share his lessons learned on how to stay focused and innovative as you scale while also avoiding the innovation for innovation’s sake pitfalls.

Scale 151
article thumbnail

Authentication: Methods, Protocols, and Strategies

Frontegg

In reality, many devices and computing systems have weak or ineffective authentication, or authentication is not properly configured by administrators, resulting in severe security risks. Secure authentication mechanisms are necessary to enable easy development, prevent accidental data exposure, and protect against cyber attacks.

article thumbnail

Everything You Need to Know About Freemium Pricing

OpenView Labs

But if freemium is right for you, you’ll need to constantly innovate, iterate and evolve – and then, hopefully, gain the traction you need to stand out in a crowded market full of other free products. Freemium Model for SaaS – The Good, The Bad, and The In-between. No business model is foolproof, of course.

Pricing 82
article thumbnail

10 Years In Tech

Outseta

What I’m hoping this post provides is an objective look at the world of technology start-ups—the good, the bad, and the ugly. Before I lived it, I thought of the tech world as being very business oriented—a place owned by analytical types and developers writing rigid blocks of code that looked like gibberish to me.