On this special Halloween episode, Howard Holton and Jon Collins tell each other scary stories from their tech past. Enter for tales of corrupted servers, ransomed software, and maybe a haunted hard drive or two.
Related Research
GigaOm Key Criteria for Evaluating Content Delivery Network (CDN) Solutions
A content delivery network (CDN) is a distributed network of server and caching points of presence (PoPs) built to distribute centralized…
Read MoreGigaOm Key Criteria for Evaluating Software-Defined Wide Area Network (SD-WAN) Solutions
A software-defined wide area network (SD-WAN) provides branch offices, distributed workforces, and remote workers fast, seamless access to corporate applications, resources,…
Read MoreGigaOm Key Criteria for Evaluating Data Security Platforms (DSPs)
Poorly managed and inadequately secured data leaves organizations at risk for a data breach and increases the costs of storage and…
Read MoreGigaOm Key Criteria for Evaluating API Functional Automated Testing Solutions
API functional automated testing brings testing rigor to APIs. This is important because applications today are increasingly collections of APIs with…
Read MoreGigaOm Key Criteria for Evaluating User and Entity Behavior Analytics (UEBA) Solutions
User and entity behavior analytics (UEBA) is a security domain that detects potential threats by monitoring and analyzing system behaviors. Using…
Read MoreGigaOm Radar for Scale-Out File Storage
Despite the growing use of object storage, file storage remains one of the most popular ways to store data, both on-premises…
Read More