Welcome!

Containers Expo Blog Authors: Elizabeth White, Derek Weeks, Pat Romanski, Miska Kaipiainen, Automic Blog

Blog Feed Post

The CTOvision Disruptive IT List: Firms we believe all enterprise technologists should be tracking

By

findata2Disruptive IT List

The CTOvision.com Disruptive IT List is our assessment of the technology firms with the greatest potential for virtuous disruption of enterprise IT.

Our goal is to provide enterprise CTOs with advanced notice of firms they should be evaluating now for use in transforming their technology base. We believe the firms here meet a threshold of significance that warrants special attention.

 

The CTOvision.com Disruptive IT List includes:

 

10gen: Production support for MongoDB

10gen’s comprehensive range of services enable you to get the most out of commercial-grade deployments of MongoDB. 10gen develops MongoDB, and offers production support, … [Read More...]

Actifio: Radically Simple

Actifio solutions are deployed in physical, virtual or hybrid IT environments in enterprise IT organizationsacross all vertical markets and in managed or cloud service … [Read More...]

ActivIdentity: Smarter Credential Management

ActivIdentity Corporation operates as a global company in authentication and credential management, providing solutions to confidently establish a person’s identity … [Read More...]

Appthority: The Authority in App Security

ENTERPRISE Appthority’s primary customers are enterprises and businesses concerned with the risk of mobile apps. Appthority provides best-in-class App Reputation, by … [Read More...]

Apptio: Technology Business Management Software

Apptio’s On-Demand Technology Business Management Software Apptio’s on-demand Technology Business Management (TBM) software is a comprehensive solution that enables …[Read More...]

Attivio: Insight That Matters

Comprehensive knowledge is critical to the success of your enterprise, but the information that decisions and processes depend on is created and stored in many formats … [Read More...]

Bromium: Virtualization and Cloud Security

The virtualization and cloud security company has closed a $9.2 million series A round of funding from Andreessen Horowitz, Ignition Partners and Lightspeed Venture … [Read More...]

Carbon Black: Providing Elemental Insight

Carbon Black is the first ‘security camera’ for your computer. By logging binary execution, file system modifications, Registry modifications and new network connections … [Read More...]

Cataphora: Putting a Face on Big Data

What motivates your employees? What concerns them? How does this differ from person to person, or group to group? How does this change with time? How do your people … [Read More...]

Catbird’s vSecurity

While virtualization offers many benefits to enterprise such as lower costs and greater flexibility, it also creates new challenges. One of the greatest concerns with … [Read More...]

Centripetal Networks: Trusted Internet

Centripetal is bringing to market advanced network hardware and software products to implement trusted networks. We believe current cyber security methods and techniques …[Read More...]

CipherCloud: Building Trust in the Cloud

CipherCloud eliminates data privacy, data sovereignty, security, and regulatory compliance concerns, and accelerates cloud adoption. Our solution is well appreciated … [Read More...]

Clearstory: Self-driven Big Data

ClearStory Data is focused on enabling self-driven big data exploration. ClearStory Data is making it easy for business users to gather and explore big, diverse, … [Read More...]

Cleversafe: Limitless Data Storage

Cleversafe is a company making dramatic improvements to how enterprises leverage their data. Their software solutions enable dispersed storage networks that provide … [Read More...]

Cloudera: Extract Benefit From All Your Data

Cloudera offers enterprises a powerful new data platform built on the popular Apache Hadoop open-source software package. We enhance the storage and processing … [Read More...]

Couchbase: The NoSQL Database Leader

Couchbase is the NoSQL database market share leader, with production deployments at AOL,Deutsche Post, NTT Docomo, Salesforce.com, Starbucks, Turner Broadcasting Systems, …[Read More...]

Cumulogic: Redefining Platform as a Service (PaaS)

CumuLogic is redefining Platform-as-a-Service (PaaS) to include a complete platform for running applications in the cloud – not just developing applications, but … [Read More...]

Datameer: Changing the Big Data Landscape

Datameer is the first and only end-user focused analytics application for Hadoop. It provides four key elements: Wizard-based data integration of structured and … [Read More...]

DataStax: Solutions for Apache Cassandra

DataStax Enterprise is tailor made to manage Big Data. DataStax Enterprise’s built-for-scale architecture – based on Apache Cassandra – enables it to handle huge … [Read More...]

Digital Reasoning: Automated Understanding for Big Data

Synthesys is the flagship product from Digital Reasoning that delivers Automated Understanding for Big Data. Enterprise and Government customers are awash with too much … [Read More...]

Discovix: Turning Chaos into Cases

Discovix, Inc. provides peta-byte scale Curiosity Engines which accelerate human intuition to computer speed. Human Intuition is a vital part of pattern recognition. In … [Read More...]

Drawn To Scale: The Database for Real-Time Big Data

Spire combines the reliability and scale of HBase with the flexibility of a conventional SQL database. Every aspect of Spire is built to be distributed, so that neither … [Read More...]

Fixmo: The Mobile Risk Management Company

Fixmo Inc. is the Mobile Risk Management (MRM) company that enables government agencies and enterprises to identify, mitigate and manage the risks associated with the … [Read More...]

ForgeRock Open Platform

ForgeRock is the global open source vendor behind the I3 Open Platform. ForgeRock identity-oriented middleware powers solutions for thousands of the world’s largest … [Read More...]

Github: Social Coding

GitHub helps people build better software, together. Powerful collaboration, review, and code management for open source and private development projects. GitHub is … [Read More...]

Invincea Browser Protection

Invincea™ Browser Protection shields your network from the largest attack surface for breach by seamlessly moving desktop web browsers into a controlled virtual … [Read More...]

Ixreveal: Next Generation Advanced Analytics

Founded in 2000, Ixreveal, Inc. is a privately held company headquartered in Jacksonville, Florida that provides next generation text analytics. The company holds … [Read More...]

JackBe: Enabling analysts from the enterprise

Enterprise grade mashups for real-time insight and decision-making. Rapidly and securely combine previously unconnected information in new ways without complexities, … [Read More...]

Kapow: The Application Integration Company

Your company’s success depends on scaling your business with automation, rather than simply spending more. Kapow Software’s innovative Application Integration … [Read More...]

MarkLogic Powers Mission-Critical Big Data Applications Around the World

MarkLogic is a 21st century technology for 21st century challenges. Traditional relational databases were built for another era and organizations are seeking alternatives … [Read More...]

Mocana: Securing the Internet of Things

Mocana secures the “Internet of Things” – the 20 billion non-PC devices that are increasingly connecting to networks across every sector of our economy including … [Read More...]

NerVve Technologies: High Speed Automated Video Analytics

NerVve massively accelerates the review of huge stores of video and FMV (including aerial, street-level, UGS, CCTV styles and more), working with the analyst to find … [Read More...]

Nicira Virtualizes the Network

Virtualization and cloud are the most significant transformations in IT in over 30 years, since client-server superseded the mainframe as the primary computing platform … [Read More...]

Okta: On-Demand Identity Management for All Your Web Applications

Okta is an on-demand identity and access management service that enables enterprises to accelerate the secure adoption of their web applications, both in the cloud and … [Read More...]

Pindrop Security: The Phone Fraud Experts

Pindrop Security has developed a breakthrough caller-ID product that helps detect, report and mitigate phone fraud. We have developed a patent-pending solution that can … [Read More...]

Platfora: Clarity From Big Data

THE CURRENT GENERATION OF TECHNOLOGIES BREAKS AT THIS SCALE.Today’s business intelligence products are designed for the datasets of the 1990s, and IT organizations are …[Read More...]

Rap Genius: Knowledge on Knowledge

Crowd-sourced annotation of all texts. Rap Genius is your guide to the meaning of rap lyrics You can listen to songs, read their lyrics, and click the lines that … [Read More...]

Recorded Future: Unlock the Predictive Power of the Web

Government and defense organizations are under increasing pressure to forecast future events, and while no one has a magic crystal ball, Recorded Future provides … [Read More...]

SafeNet: The Data Protection Company

SafeNet persistently protects your organization – from idea to action – by engineering solutions that adapt as your business evolves, giving you the confidence and … [Read More...]

Saratoga Data Systems: Move data incredibly fast over any network

Saratoga Data Systems focuses on solving the problems associated with extreme data volumes. The Saratoga Optimization Platform provides businesses with the ability to … [Read More...]

Sitscape: Award-Winning Situational Software

Today’s businesses are facing the growing pains of overwhelming information that is scattered across various disparate systems and business units. Knowledge workers and … [Read More...]

Solera: Network Security Analytics

We live in an era where the defensive capabilities of traditional security tools have been eclipsed by the capabilities of modern attackers. Major breaches are … [Read More...]

Splunk: Make Your Machine Data Accessible, Useful, and Valuable

Your data contains a definitive record of your user transactions, customer behavior, machine behavior and fraudulent activity, information that is essential for managing, … [Read More...]

Terracotta: Snap in solutions for application scale and speed

Terracotta is a silicon valley firm with incredible capabilities centered around enhancing computer system performance. Terracotta is the company behind some of the most … [Read More...]

Thetus: A simple, intuitive approach to complex analysis

The Savanna solution takes the geo-cultural and spatio-temporal analysis workspace to the next level with a powerful set of analysis tools and innovative interfaces that … [Read More...]

Tidemark: Rethinking analytic applications

Tidemark thinks that it’s time to rethink analytic applications. It’s time for self-reliant applications for every user, not more meaningless reports that no one … [Read More...]

Tom Sawyer Software: Advanced Visualization and Analysis

Tom Sawyer Software products are used to build and deploy sophisticated data visualization and social network analysis applications. Backed by twenty years of pioneering … [Read More...]

Treeminer: The Vertical Data Mining Company

Treeminer offers state of the art vertical data mining classification solutions with significant scalability and accuracy benefits over existing classification … [Read More...]

Triumfant: A New Approach to IT Security

Triumfant provides a revolutionary alternative to traditional endpoint security products through one-of-a-kind software that detects and remediates malwarewithout … [Read More...]

WayIn: Which Side Are YOU On?

Wayin is a new mobile engagement service developed by Scott McNealy, founder of Sun Microsystems. Utilizing the free Wayin app on their mobile devices, users post images … [Read More...]

 

For additional information about this list including our methodology see: About the Disruptive IT List.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder and partner at Cognitio Corp and publsher of CTOvision.com

@ThingsExpo Stories
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...