This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Many CEOs of software-enabled businesses call us with a similar concern: Are we getting the right results from our software team? We hear them explain that their current software development is expensive, deliveries are rarely on time, and random bugs appear. What does a business leader do in this situation?
Similarly, in customer support , AI-driven chatbots and automated response systems are taking over routine support, effectively handling common issues such as account inquiries or basic troubleshooting. Overall, generative AI is a transformative asset in the software engineering lifecycle, from conception to deployment.
Many companies believe excellent product design comes from hiring the best engineers and signing up for the latest software instead of building from the users’ perspectives. Stripe’s CTO, David Singleton, shares how they use a system of feedback, iteration, and fast shipping to create products that meet users’ expectations.
If you're grappling with this issue, identifying the specific cause can be difficult, especially if you don’t have a software background. This is where a technical review can be useful!) Before we review the symptoms, though, please bear this in mind: If your team shows these signs, it doesn’t necessarily mean they’re weak.
Intercom has responded by hiring a diversity and inclusion consultant, updating our recruitment strategy and hiring practices to reduce bias, scheduling allyship training for all employees, and amplifying Black voices in our podcast and blog. And the response was overwhelming. The question was not, “should we do this?”
Being on call out of office hours is inherently disruptive to your life. Uptime is influenced by many factors such as the software architecture and the quality of day to day operations. Back in the early days of Intercom, our CTO Ciaran was the entirety of the on call team, both in and out of the office.
You have to be careful to pair that with someone strong to manage the relationship, that has more time and that also can be trusted. As a founder, you’ll just run out of time to properly manage key customers and partners yourself. Hire that person, and make sure they are someone the top customers can really trust and count on.
ISO 27001 stipulates specific requirements for establishing, maintaining, and improving an organization’s information security management system (ISMS). The preparation costs To obtain an ISO 27001 certification, your organization needs to implement an Information Security Management System (ISMS).
to, “When and how often is sales tax due to the state?”. So even the freshest new SaaS startup celebrating their 50th customer may find themselves dealing with sales tax in multiple states. . Say you sell a subscription-based software but you also send your customers a handy flash drive with a version of your software on it.
Upon joining BetterCloud as its new CTO, Jamie Tischart was taken aback when he reviewed his professional biography with a colleague. The first line was, ‘With almost three decades in technology,’” he told me. One of the things that we all complain about is the systems and processes across all of our companies.
In fact, it’s quite simple: AI systems excel at extracting insights from huge datasets, then they use those insights to make predictions. The most advanced AI systems learn and improve over time, on their own. You’ll need to do your own duediligence on each of these tools, however.
And as nice as verbal assurances and a handshake are, as you grow and try to sign with more established, enterprise-level companies, you’ll find yourself more and more having to provide proofs of compliance before closing the deal: The shift to the cloud, more and more data breaches – it really put a magnifying glass on third-party risk.
We use a multi-touch attribution system. We spent a lot of time and effort setting up that foundational system, making sure that our data was really good. A lot of folks outsource performance marketing to agencies or use a simpler attribution system, which is fine and correct if your budget is smaller. .
Penetration Testing Explained Imagine you hire someone to try to break into your business – not physically, but digitally. To identify vulnerabilities in your systems, applications, or network so you can fix them before an actual cyberattack occurs. That’s essentially what penetration testing is (aka “pen testing”).
That question has been on Will Larson ‘s mind for a long time. For those who don’t know him, Will has over 10 years of experience in the likes of Yahoo, Digg, Uber, and Stripe, and he’s currently the CTO of Calm , the mindfulness app that helps millions of people to lower their stress levels and sleep better.
Today, we are going to review Fyle , an online expense management software for modern businesses. Don’t trust technology with your finance expenses? Let’s face it, even the top-notch expense management software can fail your employees if they don’t use it, but it also has to be easy and simple to use. Enterprise.
Ideas Ryan finds transformative [29:33]. Hiring managers are also just trying to sell as well. And most of our data now as a software company it’s because that’s my background, but you as a sales professional can go to RepVue and view detailed analytics about sales organizations related to compensation data.
Hiring and cultivating incredible talent on our Information Security team. Shipping is our heartbeat ” has been the motto of the Intercom R&D org from the very beginning and engineers ship code to our customer-facing production app dozens of times a day. Shipping quickly and securely. Continuous risk management.
We’re thrilled to announce that Frontegg was named a G2 Best Software Award Winner, placing #26 on the Top Security Products list alongside other best-in-class tools, such as Okta, Microsoft Azure Active Directory, GitLab, IBM Security Verify, Snyk, Datadog, and GitHub. link “Frontegg seems to get it.
Amanda Renteria , CEO for Code for America. Will Larson , CTO of Calm. Des Traynor , Co-founder and CTO of Intercom. Code for America’s Amanda Renteria on defining the citizen experience. Amanda Renteria, CEO of Code for America, is a firm believer in this idea. Hubert Palan , founder and CEO of Productboard.
How to find advisors when you’re a CEO [22:32]. Today on the show, we’re excited to have Vishal Sunak, the CEO and founder of LinkSquares where he’s responsible for developing strategies aimed at assisting both corporate, legal, and finance teams with the review of their contracts. Show Introduction [00:10].
At some point in every software company’s growth comes the great challenge of tackling the enterprise market. brought together CTOs from PlanGrid, One Medical and AdRoll to discuss what they look for when evaluating software. A lot of our clients want to target CTOs or C-level executives,” said Valentino Volonghi, CTO of AdRoll.
Flexible integration with any other software, hardware or business workflow applications. Mallun Yen : So, you were an engineer by training and then you became an engineering leader, as the CTO of Webex, and then you became a CEO. Mallun Yen : And so, what led you to decide, that okay, my first 33 hires are going to be engineers?
As businesses continue to embed payment solutions into their software platforms, ensuring compliance with PCI DSS (Payment Card Industry Data Security Standards) is more important than ever. Candice offers valuable insights into why PCI compliance is critical and how software companies can navigate this complex landscape. is essential.
In this framework, you’ll learn how to design a scoring system that aligns to your growth strategy, brainstorm and select leader indicators of success, and operationalize the system across your startup. It’s not uncommon for early-stage teams to lean on CS to improve renewal rates and buy time for their software to catch up.
Initially, businesses only see a few basic requirements, but later realize there is much more hidden below the surface as it relates to the ongoing creation and maintenance of custom code. Using precious development resources to build and maintain your own recurring billing code, and all the complexities that arise, 1.
They built an engine to find the customers that loved their product, find the features they really liked and then built their value messaging around it. They built an engine to achieve product market fit and find positioning. Two key things greatly helped find their positioning. How did they get to this positioning?
DevOps is really a set of ideas and practices that emphasise a culture and environment where building, testing, and releasing software can happen rapidly, frequently, and more reliably. DevOps best practices that will help you to run your software development projects smoothly. Fail often, fail fast.
Find nothing—vacuum. Drill down on the current AI emergence, find so much that, like me, you’ll have trouble even keeping up. Apple’s bag is mixed , with strength in ML-enabled silicon but weakness on AI software, particularly Siri’s grave limitations and snails-pace evolution. Once burned, twice shy.
” Autonomy (project) or code monkey (tasks), which do you think your dev teams will prefer? Scope shapes Shape Up warns us that not all scopes have the nice layer-cake shape with a layer of UI over a thin supporting layer of back-end code. We never did figure out a good system for managing uncertainty. See you soon!”
I follow DHH and Jason Fried on Twitter and generally find myself agreeing with their often-contrarian points of view. Bigger – it speaks to every aspect of the software development process. In those days, most software development happened using the lumbering, ultra-heavyweight waterfall methodology. Big as in a 143 page PDF.
For example, Amplitude is a product analytics software. And then when they do actually sign up, it's up to me or the product team to make sure that within that time period, they're activated and they are finding usage, right? And they already know the software so you just need to negotiate price. Is 7 days enough?
Finding LPs to invest in Latin American startups is a challenge. There is a shift towards less capital-intensive startups with recurring revenues, and duediligence is crucial before taking on investors or advisors. Responsible tech in an era of hostile tech Rebecca Parsons, CTO (Thoughtworks.) Web Summit Rio, day 3.
Erica Schultz is Chief Revenue Officer @ New Relic, the company that gives you the real time insights your software driven business needs to innovate faster. If you would like to find out more about the show and the guests presented, you can follow us on Twitter here: Jason Lemkin Harry Stebbings SaaStr.
Listen to the start of the episode for a promo code to our upcoming events! If you would like to find out more about the show and the guests presented, you can follow us on Twitter here: Jason Lemkin. Yousuf Khan: Well, the CIO is fundamentally owning the business technology function of the company. Loving our podcast content?
And, The Hustle team decided that having "billionaire" in the title of the episode will attract more viewers -- so here we are. :) In any case, it's a fun episode and we cover a lot of different topics that I'm hopeful you'll find useful. And I think part of it's because you've been in the game for a while and you're incredibly successful.
If you would like to find out more about the show and the guests presented, you can follow us on Twitter here: Jason Lemkin. Most people don’t want to customize their software. And especially when there’s a polarizing change, everybody shows up to work wanting to do right by the people who are using your software all day.
Where’s the software development coming from? Brendan Kamm: One thing you’ll find as you talk to me is that everything in my life, I’ve found the power of the network and the relationships , which of course, is exactly what Thnks is about. ” I’m like, “Okay, is the proposal due tomorrow?”
As your software business grows large enough to expand into more countries or regions, the system or multiple systems you use to sell it can become more and more complex. Or, you can simplify the system with one global merchant of record. they found themselves with two separate shop systems. was not efficient.
And, The Hustle team decided that having "billionaire" in the title of the episode will attract more viewers -- so here we are. :) In any case, it's a fun episode and we cover a lot of different topics that I'm hopeful you'll find useful. And I think part of it's because you've been in the game for a while and you're incredibly successful.
The crux of compliance automation is using technology to replace processes that previously required strenuous manual tasks. By using leading-edge technology and compliance automation platforms assure organizations that activities, processes and systems are all up to standard with the latest regulatory changes and requirements.
Without thorough, well-organized, and accurate documentation, even the most secure systems could crash and burn – failing the audit simply because theres no proof to back up your efforts. Complementary User Entity Controls (CUECs) CUECs are controls that customers must implement within their own systems to maintain data security.
Join us as we explore the importance of a SOC 2 compliance gap analysis, outline how to create a solid plan to bridge identified gaps, share best practices for conducting a gap analysis, and uncover how leveraging compliance automation software can streamline the process. Scytale streamlined the process by providing expert-driven technology.
Gap Analysis Before you officially start the audit, it’s always a good idea to conduct an internal review of your existing security practices. This is all part of the process but is a critical step in ensuring your business meets the standards required for SOC 2 attestation. This is called a gap analysis.
We organize all of the trending information in your field so you don't have to. Join 80,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content