Remove 2014 Remove Load Balancer Remove Network Remove Security
article thumbnail

Why F5 and Tempered Networks founder Jeff Hussey left retirement and ‘bought’ himself a job

GeekWire

Jeff Hussey, CEO and co-founder of Tempered Networks, and his wife on a trip to Austria. Jeff Hussey , co-founder and CEO of Seattle’s Tempered Networks, is not a believer in long-term work-from-home practices. “We In 2014 , he became CEO and co-founder of Tempered. “I Photo courtesy of Jeff Hussey). Jeff Hussey.

Network 104
article thumbnail

IBM to Acquire Cloudant: Open, Cloud Database Service Helps Organizations Simplify Mobile, Web App and Big Data Development

CTOvision

– 24 Feb 2014: IBM (NYSE: IBM ) today announced a definitive agreement to acquire Boston, MA-based Cloudant, Inc., To meet this growing demand, data must be always available and easily accessed by massive volumes and networks of users and devices. – bg.

IBM 268
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #58

Scott Lowe

Networking. Mustafa Akin has an article on Docker’s new overlay networking functionality. Here’s a post that claims to translate OVS and OpenStack Neutron to the network engineer’s language. I would respond to that by saying OpenStack Neutron wasn’t built to manage a physical network. Now, on to the content!

Vmware 60
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. But did you know there’s an elite group of bug bounty hunters that travel the world? and such.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. But did you know there’s an elite group of bug bounty hunters that travel the world? and such.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. But did you know there’s an elite group of bug bounty hunters that travel the world? and such.