Managed Kubernetes is a cloud-based service that simplifies the deployment, scaling, and management of containerized applications using Kubernetes, an open-source platform…
Read MoreResearch
GigaOm Key Criteria for Evaluating Kubernetes Data Protection Solutions
Kubernetes data protection encompasses data backup and recovery solutions that support protecting Kubernetes-based applications in the cloud and on-premises by creating…
Read MoreGigaOm Radar for Managed Kubernetes
Managed Kubernetes has evolved from a simple container orchestration platform to become a comprehensive compute management solution. By automating critical processes…
Read More2025 Predictions: Cloud Architectures, Cost Management and Hybrid By Design
In this episode of our predictions series, we consider the evolving nature of Cloud, across architecture, cost management, and, indeed, the…
Read MoreGigaOm Key Criteria for Evaluating Application Performance Management (APM) Solutions
Applications provide an entry point for those seeking products and services from government, businesses, and non-profits worldwide. Yet, growing application complexity…
Read MoreGigaOm Key Criteria for Evaluating Cloud Management Platform (CMPs) Solutions
Cloud management platforms (CMPs) are suites of integrated tools that help organizations manage and monitor hybrid and multicloud environments. These solutions…
Read MoreGigaOm Key Criteria for Evaluating Scale-Out Storage Solutions
The digital universe is expanding at an astonishing pace and, with it, the volume of unstructured data that organizations must manage…
Read MoreGigaOm Radar for Kubernetes Data Protection
Kubernetes has become the standard for cloud-native applications, including those with stateful data. It is also gaining a foothold as the…
Read MoreGigaOm Radar for Primary Storage
Primary storage remains a cornerstone of enterprise IT infrastructure, providing the foundation for mission-critical applications, databases, and a growing range of…
Read MoreThe EU’s AI Act
Have you ever been in a group project where one person decided to take a shortcut, and suddenly, everyone ended up…
Read MoreDemystifying data fabrics – bridging the gap between data sources and workloads
The term “data fabric” is used across the tech industry, yet its definition and implementation can vary. I have seen this…
Read MoreThe Evolving Revolution: AI in 2025
AI was 2024’s hot topic, so how is it evolving? What are we seeing in AI today, and what do we…
Read MoreGigaOm Key Criteria for Evaluating Data Warehouse Solutions
Data warehouses store and process data to provide meaningful business insight. They are foundational to many organizations’ data management strategies. In…
Read MoreGigaOm Sonar for Vector Databases
Vector databases store large volumes of unstructured data, making that data highly queryable and available for contextual use in AI applications.…
Read MoreDiscovering Disruptions in Tech – with TRob of Domino Data Lab
GigaOm’s Howard Holton is joined by COO TRob of Domino Data Lab to discuss AI Governance and its evolution over the…
Watch NowUnleashing Transformation
AI isn’t just another tool in the technology toolkit; it’s a revolution waiting to be led. As tech leaders, this is…
Read MorePreparing for a Billion Developers
With the vision of a billion developers, AI is evolving from a specialized tool to a platform that democratizes coding. As…
Read MoreGigaOm Radar for Data Catalogs
Data catalogs house the operational, technical, and business metadata used to describe, contextualize, and understand an organization’s data assets. These centralized…
Read MoreGigaOm Key Criteria for Evaluating Enterprise Process Automation (EPA) Solutions
Intelligent automation and hyperautomation have become technology buzzwords over the last few years. They represent the next evolutionary step following previous…
Read MoreGigaOm Radar for API Functional Automated Testing
API functional automated testing involves verifying that an API’s functionality meets specified requirements through automated testing. Specialized tools and platforms streamline…
Read MoreGigaOm Radar for Enterprise Process Automation (EPA) Solutions
Intelligent automation and hyperautomation have become technology buzzwords over the last few years—they represent the next evolutionary step following previous digital…
Read MoreDevOps, LLMs, and the Software Development Singularity
A Brief History of DevOps To understand the future of DevOps, it’s worth understanding its past—which I can recall with a…
Read MoreFrom Here to GitOps and Back Again
The IT sector has been pursuing automated deployment for a very long time. Back in the day, application release automation mapped…
Read MoreGigaOm Radar for GitOps
Enabled by infrastructure as code (IaC), GitOps takes advantage of the “as code” aspect to move configuration information into version control…
Read MoreCxO Decision Brief: Mastering Continuous Testing with Automation
Ideal application development should be a frictionless process designed to deliver products as quickly as possible. Of course, reality is far…
Read MoreGigaOm Key Criteria for Evaluating GitOps Solutions
GitOps is an approach to supporting continuous software delivery that aims to simplify, accelerate, and improve the way organizations apply application…
Read MoreCosts and Benefits of .NET Application Migration to the Cloud
Thousands of custom applications written using development frameworks such as ASP.NET are deployed by organizations, often running in on-premises environments. At…
Read MoreGigaOm Key Criteria for Evaluating Network as a Service Solutions
Network as a service (NaaS) is a cloud-based networking model that allows organizations to manage and scale their network infrastructure through…
Read MoreGigaOm Key Criteria for Evaluating Container Networking Solutions
Container networking solutions provide lower-level (Layer 3 and 4) networking capabilities that support communications within and between pods and clusters in…
Read MoreBridging Wireless and 5G
Wireless connectivity and 5G are transforming the way we live and work, but what does it take to integrate these technologies?…
Read MoreGigaOm Sonar for Data Processing Units (DPUs)
Data processing units (DPUs) are specialized hardware components designed to accelerate key tasks like telecom networking, storage management, and security processing…
Read MoreGigaOm Radar for Network Validation
Historically, network engineers relied on manual processes and ad hoc testing to verify network configurations and troubleshoot issues. However, as networks…
Read MoreGigaOm Radar for Container Networking
Container networking solutions provide Layer 3 and 4 networking capabilities that enable communication within and between pods and clusters in distributed…
Read MoreGigaOm Radar for Network as a Service Solutions
Network as a Service (NaaS) is evolving from a buzzword to an operational business-critical solution, a seismic shift driven by the…
Read MoreGigaOm Radar for Software-Defined Wide Area Network (SD-WAN) Solutions
SD-WAN (software-defined wide area network) is a transformative networking technology that has revolutionized the way organizations manage and optimize their wide…
Read MoreGigaOm Solution Brief: Greymatter.io
This GigaOm Solution Brief was commissioned by Greymatter.io and is based on the GigaOm Radar Report for Service Mesh, 2024. Greymatter.io…
Read MoreCEO SPEAKS with Rajat Bhargava
GigaOm’s Ben Book is joined by Rajat Bhargava, CEO of Jumpcloud to discuss leadership and entrepreneurship in the tech industry.
Watch NowCEO Speaks with Barry Mainz of Forescout
GIgaOm’s Ben Book is joined by Barry Mainz, CEO of Forescout to discuss leadership in the tech industry
Watch NowCEO Speaks with Alex Berry of Applitools
Join GigaOm’s Ben Book as he sits down with Applitool CEO Alex Berry to discuss leadership and innovation in the tech…
Watch NowGigaOm Key Criteria for Evaluating Primary Storage Solutions
Primary storage has evolved significantly beyond its traditional role of structured data management. Today’s solutions must address a complex array of…
Read MoreCEO Podcast – with James Winebrenner of Elisity
GigaOm’s Ben Book sits down with Elisity CEO James Winebrenner to discuss leadership and building a company in the tech industry.
Watch NowDriving AI Transformation
As we head into 2025, CEOs are focused on a clear set of priorities—AI-enabled growth, dynamic capacity, risk management, and human-machine…
Read MoreThe Modern CIO
At the recent Gartner Symposium, there was no shortage of data and insights on the evolving role of the CIO. While…
Read MoreCEO SPEAKS with Gleb Budman of Backblaze
GigaOm’s Ben Book sits down with Backblaze CEO Gleb Budman to discuss tech leadership and growth in the industry today.
Watch NowGigaOm Radar for Intelligent Document Processing (IDP)
Intelligent document processing (IDP) solutions enable the transformation of documents (both paper and electronic) containing unstructured, semistructured, and structured data into…
Read MoreGigaOm Key Criteria for Evaluating Insider Risk Management Solutions
Insider risk management is the process of identifying, assessing, and mitigating the potential threats posed by organizational insiders—those who have authorized…
Read MoreGigaOm Key Criteria for Evaluating Application and API Security Solutions
Application and API security technology encompasses a suite of tools and practices designed to protect software applications and their interconnected APIs…
Read MoreGigaOm Key Criteria for Evaluating Data Security Platform (DSP) Solutions
Poorly managed and inadequately secured data leaves organizations at risk of a data breach and increases the costs of storage and…
Read MoreGigaOm Radar for Cloud Workload Security
Cloud workload security (CWS) has evolved into an essential enterprise security framework, providing comprehensive protection for diverse cloud workloads across major…
Read MoreMaking Sense of Cybersecurity – Part 2: Delivering a Cost-effective Response
At Black Hat Europe last year, I sat down with one of our senior security analysts, Paul Stringfellow. In this section…
Read MoreMaking Sense of Cybersecurity – Part 1: Seeing Through Complexity
At the Black Hat Europe conference in December, I sat down with one of our senior security analysts, Paul Stringfellow. In…
Read MoreGigaOm Key Criteria for Evaluating Unified Endpoint Management (UEM) Solutions
The allocation of resources toward information technology-based endpoints is a significant part of any modern IT budget. The contemporary IT landscape…
Read MoreGigaOm Key Criteria for Evaluating Container Security Solutions
Container security solutions are comprehensive tools designed to protect containerized applications and their underlying infrastructure throughout the software development lifecycle, from…
Read MoreGigaOm Key Criteria for Evaluating Autonomous Security Operations Center (SOC) Solutions
Autonomous security operations center (SOC) solutions are converged security operations (SecOps) tools that handle data ingestion and management, threat hunting, orchestration,…
Read More