article thumbnail

In the Vault: Turning Developers Into Clients With Marco Argenti From Goldman Sachs

Andreessen Horowitz

And so I became the CEO of that company, it was called Wireless Solutions. And so when Amazon called me and they’re like, “Hey you want to come with us and do you want to actually start the mobile services, backend business within AWS?” So, then I went into apps. ” I jumped to the opportunity.

article thumbnail

Managed 4G/5G service connects to Amazon, Microsoft clouds

IT World

Federated Wireless is launching a turnkey 4G/5G service through a partnership with Amazon Web Services and Microsoft Azure that runs over Citizens Broadband Radio Service (CBRS), which the Federal Communications Commission opened up to public use in January. To read this article in full, please click here

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using Gross Margin to Score Your Product’s Maturity

OpenView Labs

For example, when coming to a cloud vendor, deciding to be vendor agnostic at the time of product design ensures you aren’t tied down to AWS, Microsoft Azure, or Google Cloud. Wireless carriers, for example, have been depending on it for decades. In the ordinary course of business, spoilage is inevitable.

Scale 52
article thumbnail

Twilio: The First $100m+ ARR with Jeff Lawson, CEO/Co Founder (Video + Transcript)

SaaStr

If you’re on text messaging, voice calls, video calls, authentication, even now wireless capabilities inside of apps, Twilio is an easy set of APIs that developers use to embed communications into their apps. We’ve got a lot of new product lines in the market, programmable chat, programmable video, programmable wireless.

Scale 294
article thumbnail

Authentication: Methods, Protocols, and Strategies

Frontegg

The Zero Trust security paradigm, adopted by the US government and security giants like Google, Microsoft, and AWS, has secure authentication at its core. When used for wireless communications, EAP is highly secure because it allows remote devices to perform mutual authentication using built-in encryption. Related: OIDC vs SAML.