API functional automated testing is a critical technology for ensuring the reliability and performance of APIs (application programming interfaces), which serve…
Read MoreResearch
GigaOm Key Criteria for Evaluating Software Asset Management (SAM) Solutions
Software asset management (SAM) provides a means for fiscally managing software assets and implementing controls to ensure compliance with software license…
Read MoreGigaOm Key Criteria for Evaluating Managed Kubernetes Solutions
Managed Kubernetes is a cloud-based service that simplifies the deployment, scaling, and management of containerized applications using Kubernetes, an open-source platform…
Read MoreGigaOm Key Criteria for Evaluating Kubernetes Data Protection Solutions
Kubernetes data protection encompasses data backup and recovery solutions that support protecting Kubernetes-based applications in the cloud and on-premises by creating…
Read MoreGigaOm Radar for Managed Kubernetes
Managed Kubernetes has evolved from a simple container orchestration platform to become a comprehensive compute management solution. By automating critical processes…
Read More2025 Predictions: Cloud Architectures, Cost Management and Hybrid By Design
In this episode of our predictions series, we consider the evolving nature of Cloud, across architecture, cost management, and, indeed, the…
Read MoreGigaOm Key Criteria for Evaluating Application Performance Management (APM) Solutions
Applications provide an entry point for those seeking products and services from government, businesses, and non-profits worldwide. Yet, growing application complexity…
Read MoreGigaOm Key Criteria for Evaluating Cloud Management Platform (CMPs) Solutions
Cloud management platforms (CMPs) are suites of integrated tools that help organizations manage and monitor hybrid and multicloud environments. These solutions…
Read MoreGigaOm Key Criteria for Evaluating Scale-Out Storage Solutions
The digital universe is expanding at an astonishing pace and, with it, the volume of unstructured data that organizations must manage…
Read MoreGigaOm Key Criteria for Evaluating Data Access Governance Solutions
The essence of data access governance lies in finding and categorizing sensitive data, implementing access control policies to safeguard it, and…
Read MoreThe EU’s AI Act
Have you ever been in a group project where one person decided to take a shortcut, and suddenly, everyone ended up…
Read MoreDemystifying data fabrics – bridging the gap between data sources and workloads
The term “data fabric” is used across the tech industry, yet its definition and implementation can vary. I have seen this…
Read MoreThe Evolving Revolution: AI in 2025
AI was 2024’s hot topic, so how is it evolving? What are we seeing in AI today, and what do we…
Read MoreGigaOm Key Criteria for Evaluating Data Warehouse Solutions
Data warehouses store and process data to provide meaningful business insight. They are foundational to many organizations’ data management strategies. In…
Read MoreGigaOm Sonar for Vector Databases
Vector databases store large volumes of unstructured data, making that data highly queryable and available for contextual use in AI applications.…
Read MoreDiscovering Disruptions in Tech – with TRob of Domino Data Lab
GigaOm’s Howard Holton is joined by COO TRob of Domino Data Lab to discuss AI Governance and its evolution over the…
Watch NowUnleashing Transformation
AI isn’t just another tool in the technology toolkit; it’s a revolution waiting to be led. As tech leaders, this is…
Read MorePreparing for a Billion Developers
With the vision of a billion developers, AI is evolving from a specialized tool to a platform that democratizes coding. As…
Read MoreGigaOm Radar for Software Asset Management (SAM)
Software asset management (SAM) is an enterprise-class solution for managing software assets throughout their lifecycle. Its functionality includes planning for acquisition,…
Read MoreGigaOm Key Criteria for Evaluating Enterprise Process Automation (EPA) Solutions
Intelligent automation and hyperautomation have become technology buzzwords over the last few years. They represent the next evolutionary step following previous…
Read MoreGigaOm Radar for API Functional Automated Testing
API functional automated testing involves verifying that an API’s functionality meets specified requirements through automated testing. Specialized tools and platforms streamline…
Read MoreGigaOm Radar for Enterprise Process Automation (EPA) Solutions
Intelligent automation and hyperautomation have become technology buzzwords over the last few years—they represent the next evolutionary step following previous digital…
Read MoreDevOps, LLMs, and the Software Development Singularity
A Brief History of DevOps To understand the future of DevOps, it’s worth understanding its past—which I can recall with a…
Read MoreFrom Here to GitOps and Back Again
The IT sector has been pursuing automated deployment for a very long time. Back in the day, application release automation mapped…
Read MoreGigaOm Radar for GitOps
Enabled by infrastructure as code (IaC), GitOps takes advantage of the “as code” aspect to move configuration information into version control…
Read MoreCxO Decision Brief: Mastering Continuous Testing with Automation
Ideal application development should be a frictionless process designed to deliver products as quickly as possible. Of course, reality is far…
Read MoreGigaOm Key Criteria for Evaluating GitOps Solutions
GitOps is an approach to supporting continuous software delivery that aims to simplify, accelerate, and improve the way organizations apply application…
Read MoreGigaOm Key Criteria for Evaluating Disaggregated Network Operating Systems (dNOS)
A disaggregated network operating system (dNOS) represents a significant shift in network architecture, separating the network operating system software from the…
Read MoreGigaOm Radar for Data Center Switching
The market for data center switching has seen multiple transformations over the last decade due to the consolidation of data center…
Read MoreGigaOm Key Criteria for Evaluating Data Center Switching Solutions
A decade ago, data centers were much smaller and hosted large, monolithic applications deployed using the classic client-server model. This architecture,…
Read MoreGigaOm Key Criteria for Evaluating Network as a Service Solutions
Network as a service (NaaS) is a cloud-based networking model that allows organizations to manage and scale their network infrastructure through…
Read MoreGigaOm Key Criteria for Evaluating Container Networking Solutions
Container networking solutions provide lower-level (Layer 3 and 4) networking capabilities that support communications within and between pods and clusters in…
Read MoreBridging Wireless and 5G
Wireless connectivity and 5G are transforming the way we live and work, but what does it take to integrate these technologies?…
Read MoreGigaOm Sonar for Data Processing Units (DPUs)
Data processing units (DPUs) are specialized hardware components designed to accelerate key tasks like telecom networking, storage management, and security processing…
Read MoreGigaOm Radar for Network Validation
Historically, network engineers relied on manual processes and ad hoc testing to verify network configurations and troubleshoot issues. However, as networks…
Read MoreGigaOm Radar for Container Networking
Container networking solutions provide Layer 3 and 4 networking capabilities that enable communication within and between pods and clusters in distributed…
Read MoreGigaOm Radar for Contact Center as a Service (CCaaS) Solutions
Contact center as a service (CCaaS) solutions offer a unified interface to centralize customer interactions. Agents interact with a unified dashboard…
Read MoreCEO SPEAKS with Rajat Bhargava
GigaOm’s Ben Book is joined by Rajat Bhargava, CEO of Jumpcloud to discuss leadership and entrepreneurship in the tech industry.
Watch NowCEO Speaks with Barry Mainz of Forescout
GIgaOm’s Ben Book is joined by Barry Mainz, CEO of Forescout to discuss leadership in the tech industry
Watch NowCEO Speaks with Alex Berry of Applitools
Join GigaOm’s Ben Book as he sits down with Applitool CEO Alex Berry to discuss leadership and innovation in the tech…
Watch NowGigaOm Key Criteria for Evaluating Primary Storage Solutions
Primary storage has evolved significantly beyond its traditional role of structured data management. Today’s solutions must address a complex array of…
Read MoreCEO Podcast – with James Winebrenner of Elisity
GigaOm’s Ben Book sits down with Elisity CEO James Winebrenner to discuss leadership and building a company in the tech industry.
Watch NowDriving AI Transformation
As we head into 2025, CEOs are focused on a clear set of priorities—AI-enabled growth, dynamic capacity, risk management, and human-machine…
Read MoreThe Modern CIO
At the recent Gartner Symposium, there was no shortage of data and insights on the evolving role of the CIO. While…
Read MoreCEO SPEAKS with Gleb Budman of Backblaze
GigaOm’s Ben Book sits down with Backblaze CEO Gleb Budman to discuss tech leadership and growth in the industry today.
Watch NowGigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM) Solutions
Cloud infrastructure entitlement management (CIEM) solutions are specialized security tools designed to address the complex challenges of managing identities, access rights,…
Read MoreGigaOm Key Criteria for Evaluating Attack Surface Management (ASM) Solutions
The difficulties and challenges presented by rapid digital growth, cloud adoption, and the sprawling public IP space leave organizations unable to…
Read MoreGigaOm Key Criteria for Evaluating Cloud Infrastructure Entitlement Management (CIEM) Solutions
Cloud Infrastructure Entitlement Management (CIEM) is an emerging cybersecurity technology designed to address the complex challenges of managing identities, access rights,…
Read MoreGigaOm Radar for Unified Endpoint Management (UEM) Solutions
Endpoint management is one of the most significant challenges in enterprises today. This is driven in part by the increasingly large…
Read MoreGigaOm Radar for Secure Access Service Edge (SASE)
Secure access service edge (SASE) is a security framework that converges network security functions with software-defined wide-area networking (SD-WAN) capabilities to…
Read MoreGigaOm Key Criteria for Evaluating Insider Risk Management Solutions
Insider risk management is the process of identifying, assessing, and mitigating the potential threats posed by organizational insiders—those who have authorized…
Read MoreGigaOm Key Criteria for Evaluating Application and API Security Solutions
Application and API security technology encompasses a suite of tools and practices designed to protect software applications and their interconnected APIs…
Read MoreGigaOm Key Criteria for Evaluating Data Security Platform (DSP) Solutions
Poorly managed and inadequately secured data leaves organizations at risk of a data breach and increases the costs of storage and…
Read MoreGigaOm Radar for Cloud Workload Security
Cloud workload security (CWS) has evolved into an essential enterprise security framework, providing comprehensive protection for diverse cloud workloads across major…
Read More