More tech Stories

Europe flags and clouds

Can Europe build a vibrant cloud computing ecosystem? That’s a tough question today as U.S. cloud providers still dominate the industry. Join GigaOM Research analysts as they delve into what’s driving cloud opportunities and adoption in Europe in our next live webinar. Read more »

Upcoming Events

Structure Europe pic

Join GigaOM and experts from Europe’s leading technology companies, government agencies and academic institutions as they take the stage in London. Innovators from Google, Netflix, CERN and the U.K. Government Open Data Initiative will all speak at Structure:Europe, September 18 and 19. Read more »

loading external resource

cloud background 2

When considering a cloud application development and deployment platform such as a Platform-as-a-Service (PaaS) offering, one of the key considerations is the flexibility that the PaaS platform offers. Join GigaOM Research and our sponsor Red Hat for an in-depth discussion on June 25 at 10 a.m. PT. Read more »

Structure-Europe pic

Join us at Structure:Europe, where GigaOM will take the stage live, with leading minds, companies and influencers who will discuss their approaches for implementing the global cloud. Also included is a GigaOM Research report on the Helix Nebula project and the future of Europe’s cloud. Read more »

maze and sky

What are the differences between self-service, managed service and full-service IaaS providers? Learn the answer when you join GigaOM Research and our sponsor HOSTING for an in-depth webinar discussion on June 18, 2013, at 10 a.m. PT. Read more »


In this webinar, the panelists will explore the challenges exposed by BYOD and help sculpt a framework for evaluating the authentication and management tools available to secure employee-owned devices. They will also discuss how to tailor a BYOD strategy that works for your industry and corporate culture. Read more »

Security pic

In the next GigaOM Research webinar, our panel will examine the ways in which IT can become more proactive in threat identification, evaluate a threat’s origin and intent, and respond to that threat in real time or close to real time. Join us on June 12 at 10:00 a.m. PT. Read more »

1101112131424page 12 of 24

You're subscribed! If you like, you can update your settings