Remove 2014 Remove Load Balancer Remove Programming Remove Security
article thumbnail

IBM to Acquire Cloudant: Open, Cloud Database Service Helps Organizations Simplify Mobile, Web App and Big Data Development

CTOvision

– 24 Feb 2014: IBM (NYSE: IBM ) today announced a definitive agreement to acquire Boston, MA-based Cloudant, Inc., We learned about Cloudant from In-Q-Tel, a very forward thinking firm with a great track record for spotting visionary firms. – bg.

IBM 268
article thumbnail

Why F5 and Tempered Networks founder Jeff Hussey left retirement and ‘bought’ himself a job

GeekWire

“I don’t think we have the programming to collaborate and develop new ideas that are creative when we are not together.”. Hussey misses grabbing a cup of coffee with a colleague or an impromptu whiteboard session for brainstorming ideas for his network security company. In 2014 , he became CEO and co-founder of Tempered. “I

Network 99
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #58

Scott Lowe

It says the the JET (Juniper Extension Toolkit) uses “open application programming interfaces”, but fails to provide any specifics. See here for some of my thoughts on Intel’s RSA following IDF 2014.) William Lam breaks down the real value of load balancing your PSC in this in-depth article. Virtualization.

Vmware 60
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. But did you know there’s an elite group of bug bounty hunters that travel the world? and such.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. But did you know there’s an elite group of bug bounty hunters that travel the world? and such.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. But did you know there’s an elite group of bug bounty hunters that travel the world? and such.