The Whole Stack

Insights about IT infrastructure from the Battery team and our portfolio-company executives.

Unit8200Photo

The Secretive Israeli Army Unit that Recruits Like Harvard—And Churns Out High-Profile Startups

There is a common thread running through many of Israel’s most innovative tech startups, and some of the venture-capital firms that fund them: an elite…

The State of the Cloud 2015: A Review of Industry Milestones and Future Predictions

In June 2014 I presented “Cloud Trends,” a presentation on the state of the cloud computing industry at the Gigaom Structure conference. At that time…

Big Data

Is Big Data Delivering Big Value…Yet?

There has been tremendous buzz around “Big Data” fueled by the exploding volume, variety and velocity of data from mobile devices and social networks on…

CodingPhoto

What is “Low-Code” App Development? And Why Should Businesses Care?

The UK-based insurer LV= (formerly Liverpool Victoria) was facing a technical challenge. A period of rapid growth, including numerous acquisitions, had swamped its IT department…

Is Your Security Operation Hooked On Malware?

It may seem counterintuitive, but an overzealous focus on malware may be preventing you from detecting even bigger threats.

RogerUnicornPhoto

The Fastest-Growing SaaS Unicorn You Haven’t Thought About

At the beginning of this year, I wrote a short post outlining a few predictions I have about how enterprise software is going to evolve…

Go to GOTO in London to Shore Up Your Agile, Lean and Rugged Development Skills

Competitive pressures have pushed speed of software development to become one of the highest priorities for businesses today.


h

You’ve Heard of the Netflix Chaos Monkey? We Propose, for Cyber-Security, an “Infected Monkey”

A couple of years ago Netflix introduced a concept called the “Simian Army”. The idea was to implement a bunch of open-source, automated processes that…

VCs Parse Biggest Cybersecurity Threats

Venture capitalists are well-versed in “as-a-service” investments these days—the software-as-a-service, platform-as-service, and infrastructure-as-a-service companies made possible by the cloud. But what about “malware-as-a-service”?

1 2 5