article thumbnail

Is My Second Product Failing?

Casey Accidental

I’ll explain how I think about these decisions as a product leader and give more context on the journey of developing entirely new products inside a company. By general standards, the team found product/market fit, but will never be able to inflect growth of the combined company. Google on GCP? Amazon on Alexa?

article thumbnail

Tabular: Turning Your Data Swamp into a Data Lakehouse with Apache Iceberg

Clouded Judgement

Iceberg is an open table format developed by Ryan Blue and Dan Weeks (2 of the 3 co-founders of Tabular) while they were at Netflix. Iceberg leaned into the git functionality that software developers have become accustomed to. This prevents bad data from leaking downstream. But, Hive does not provide a true table specification.

Data 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best application vulnerability assessment tools for software companies (paid & free)

Audacix

A vulnerability assessment tools or virtual app scanning for your software team has become as important as your git repository or your ticket management system. You might end up building a whole team in-house to support the open source tool of your choice, which, one would think, defeats the purpose of going open source in the first place?

article thumbnail

Top 11 Security Testing Tools to Use In Your CICD Pipelines

Audacix

Table Of Contents Security testing tools are crucial in software development lifecycles because they empower you and your software teams to shift left and help your developers proactively detect and mitigate security weaknesses which can be a security threat if left unattended. AWS, Azure or GCP.

article thumbnail

Moving ChartMogul to AWS and Kubernetes

Chart Mogul

Unexplained networking issues with latency between our machines that DigitalOcean’s support team never cleared out (this was critical for our Postgres read-replicas lag, Redis instances, and HA in general). We researched the market and discovered many tradeoffs and advantages a new provider could bring to the table.

article thumbnail

The best SaaS apps have these 7 web application security controls

Audacix

Application security is seldom considered during the ideation phase of web application development - unless the development team has previously been hacked and survived to tell the tale. The most secure web applications use best practice security features throughout the software development lifecycle.

article thumbnail

Founder’s Guide to Scaling Applications: When to Build, When to Buy and What Breaks by Algolia Co-founder (Video + Transcript)

SaaStr

When it comes to seamlessly scaling your applications, a top-notch engineering team will be your foundation. We develop a search API to help any developer to have a very good search in their application. So today we are a distributed team. Of course, behind this product, we have a super strong team.

Scale 129