Hybrid cloud data protection refers to the security measures and technologies designed to safeguard data, applications, and infrastructures in hybrid cloud…
Read MoreResearch
GigaOm Key Criteria for Evaluating Kubernetes Data Storage Solutions
Kubernetes, the cloud-native data storage container orchestration system, is now ubiquitous—across the major hyperscale and edge cloud providers, smaller independent service…
Read MoreGigaOm Radar for SaaS Management Platforms (SMPs)
Companies are adopting software-as-a-service (SaaS) applications at an ever-increasing rate to achieve their digital transformation goals. SaaS applications currently represent half…
Read MoreGigaOm Radar for Enterprise Object Storage
As the volume and variety of data continue to grow exponentially, organizations are facing unprecedented challenges in managing and storing their…
Read MoreGigaOm Key Criteria for Evaluating SaaS Management Platforms (SMPs)
Software as a service (SaaS) applications represent 50% or more of most companies’ application portfolios. These applications require new operating procedures…
Read MoreGigaOm Key Criteria for Evaluating Enterprise Object Storage Solutions
Enterprise object storage is a critical component of an enterprise data strategy. Unlike block and file storage, object storage excels at…
Read MoreSave Money and Increase Performance on the Cloud
One of the most compelling aspects of cloud computing has always been the potential for cost savings and increased efficiency. Seen…
Read MoreCxO Decision Brief: Kubernetes Management for Platform Engineering Teams
This GigaOm CxO Decision Brief commissioned by Diamanti. In the rapidly evolving landscape of platform engineering, Kubernetes has emerged as a…
Read MoreGigaOm Radar for Cloud Resource Optimization
Cloud resources that are not optimized can prove costly. Cloud resource optimization solutions provide a holistic view of an organization’s public…
Read MoreCEO SPEAKS with Amir Khan
GigaOm CEO Ben Book meets with Akira CEO Amir Khan to discuss the lay of the land and the market landscape…
Watch NowCxO Decision Brief: Real-Time Data Processing and Analytics
This GigaOm CxO Decision Brief commissioned by Cogility. Cogility’s Cogynt is a continuous intelligence software platform for real-time data stream processing…
Read MoreDiscovering Disruptions in Technology – Mohan Atreya
COO Howard Holton speaks with Mohan Atreya of Rafay Systems on the nature of AI in the market, most notably attempting…
Watch NowThe Good, The Bad, & The Techy – With Special Guest, Ryan Litwin
CTO Howard Holton is joined by Ryan Litwin, an industry specialist with over 30 years of experience under his belt.
Watch NowGeneral AI’s Sustainability Impact in Manufacturing
Howard Holton stars as a guest in this round table discussion on AI and it’s place in manufacturing.
Watch NowGigaOm Key Criteria for Evaluating Data Pipeline Solutions
Data pipelines are solutions that manage the movement and/or transformation of data, readying it for storage in a target repository and…
Read MoreGigaOm Radar for Streaming Data Platforms
Streaming data platforms ingest, process, transform, analyze, and render action from streaming data in real time. The best tools can do…
Read More16 Minutes of Excellent Disney Content and Some AI Stuff
Paul Lewis, Howard Holton, and Carlos Vargas discuss Disney content and artificial intelligence.
Watch NowGigaOm Key Criteria for Evaluating Streaming Data Platforms
Streaming data platforms ingest, process, transform, analyze, and render action from streaming data in real time. The best tools can do…
Read MoreFrom Here to GitOps and Back Again
The IT sector has been pursuing automated deployment for a very long time. Back in the day, application release automation mapped…
Read MoreGigaOm Radar for GitOps
Enabled by infrastructure as code (IaC), GitOps takes advantage of the “as code” aspect to move configuration information into version control…
Read MoreCxO Decision Brief: Mastering Continuous Testing with Automation
Ideal application development should be a frictionless process designed to deliver products as quickly as possible. Of course, reality is far…
Read MoreGigaOm Key Criteria for Evaluating GitOps Solutions
GitOps is an approach to supporting continuous software delivery that aims to simplify, accelerate, and improve the way organizations apply application…
Read MoreCosts and Benefits of .NET Application Migration to the Cloud
Thousands of custom applications written using development frameworks such as ASP.NET are deployed by organizations, often running in on-premises environments. At…
Read MoreOn Microsoft’s Radius, and building bridges between infra, dev and ops
First, a story. When I returned to being a software industry analyst in 2015 or thereabouts, I had a fair amount…
Read MoreGigaOm Research Bulletin #006
As part of our ongoing process of improvement, we are excited to announce the release of our Online Research Calendar, covering the…
Read MoreGigaOm Research Bulletin #005
Welcome to GigaOm’s research bulletin for November 2023 Hi, and welcome back! GigaOm’s partnership with Ingram Micro clearly shows how we…
Read MoreDevOps efficiency needs to put business goals first
Here’s a quick story. As a business analyst, I worked at a publisher in Oxford. We were interviewing, process diagramming, and…
Read MoreGigaOm Key Criteria for Evaluating DDI Solutions
As enterprises adopt more cloud-based solutions, take advantage of hybrid networks, and deploy more IoT devices, IP address management becomes more…
Read MoreGigaOm Key Criteria for Evaluating Service Mesh Solutions
A service mesh is a powerful tool for modern software architectures, offering significant advantages in managing microservices communications. It is a…
Read MoreGigaOm Radar for Edge Development Platforms
Edge development platforms operate globally distributed infrastructure and offer computing and developer services for creating and running applications closer to end…
Read MoreDiscovering Disruptions in Technology – Jeremy Rossbach of Broadcom
COO Howard Holton is joined by Jeremy Rossbach, the chief technology evangelist at Broadcom to discuss network observability.
Watch NowThe Good, The Bad, & The Techy – Webservers with Liam Crilly of NGINX
Tune in to the latest episode of The Good The Bad & The Techy podcast where hosts Howard Holton and Jon…
Watch NowGigaOm Key Criteria for Evaluating Edge Development Platforms
Edge development platforms operate globally distributed infrastructure and offer computing and developer services for creating and running applications closer to end…
Read MoreGigaOm Key Criteria for Evaluating Edge Orchestration Platforms
Edge orchestration platforms represent a pivotal technology in the landscape of modern computing, orchestrating computing resources at the very brink of…
Read MoreNear, Far, Wherever Your CPUs Are
Over the past two years, I’ve been making the point that near edge and far edge are utilitarian terms at best,…
Read MoreCould Network Modeling Replace Observability?
Over the past four years, I’ve consolidated a representative list of network observability vendors, but have not yet considered any modeling-based…
Read MoreMultigenerational Diversity
It is common in today’s workforce to find multiple generations working alongside each other. While to some extent this has always…
Read MoreDiscovering Disruptions in Technology with Tyler Shields of Traceable
COO Howard Holton is joined by Tyler Shields of Traceable to discuss the desegregation of applications.
Watch NowGigaOm Key Criteria for Evaluating Unified Communications as a Service (UCaaS) Solutions
Enterprises are facing a multitude of changes to the traditional office paradigm. The inflexible nature of fixed, on-premises telephony solutions has…
Read MoreGigaOm Key Criteria for Evaluating Digital Experience Platforms (DXPs)
The COVID-19 pandemic and subsequent lockdowns kicked off a large-scale move to online shopping. In turn, increased competition and the need…
Read MoreThe Good, The Bad, & The Techy – Burning Everything to the Ground with Sarah Polan
A new episode of the Good, the Bad, & The Techy with special guest Sara Polan. Starring VP of Engagement Jon…
Watch NowThe Good, The Bad, & The Techy – Technology Product Marketing Pitfalls
COO Howard Holton and VP Engagement Jon Collins sit down to discuss Technology Product Marketing, specifically, where most campaigns and efforts…
Watch NowCustomer-Centric Marketing for Technology Vendors
In today’s fast-paced, highly competitive market, technology vendors often struggle to connect with their customers on a meaningful level. Traditional marketing…
Read MoreReflections on Snowflake Summit 2024
This past week, I had the opportunity to attend Snowflake Summit 2024 in San Francisco. As an analyst, I was treated…
Read MoreGigaOm Radar for Agile Planning and Portfolio Management (PPM) Solutions
In response to changing customer and employee needs, many companies escalated the adoption of agile processes. Agile planning and portfolio management…
Read MoreGigaOm Radar for Enterprise Password Management
Every organization has employees who are buried in username and password combinations for both business and personal use. The average user…
Read MorePutting It All Together: Getting Started with Your Zero Trust Journey
Welcome to the final post in our zero trust blog series! Throughout this series, we’ve explored the key components, best practices,…
Read MoreGovernance and Compliance: Aligning Zero Trust with Business Requirements
Welcome back to our zero trust blog series! In our previous post, we explored the critical role of automation and orchestration…
Read MoreAutomation and Orchestration: The Backbone of Zero Trust
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the critical role of…
Read MoreGigaOm Key Criteria for Evaluating Security Policy-as-Code Solutions
In the ever-evolving landscape of information technology, the ability to effectively manage and enforce security policies has become paramount. Policy-as-code solutions…
Read MoreGigaOm Key Criteria for Evaluating Anti-Phishing Solutions
Phishing remains the leading method used by cybercriminals to attempt to breach organizations. Successful phishing attacks lead to the loss of…
Read MoreGigaOm Key Criteria for Evaluating Cloud Access Security Broker (CASB) Solutions
A cloud access security broker (CASB) is a technology solution that acts as an intermediary between users and cloud service providers,…
Read MoreMonitoring and Analytics: The Eyes and Ears of Zero Trust
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into API security and…
Read MoreRedefining Cybersecurity: Leveraging AI for Proactive Defense
In an age where cyber threats are growing exponentially, traditional security measures are no longer sufficient. At RSAC 2024, Cisco’s Jeetu…
Read More