A Microsoft Office for Software Development with a Growing Moat, Large TAM and High-Quality Management
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Protocols: 0-9, A
Protocols: 0-9, A • 3COM-AMP3, on page 4 • 3COM-TSMUX, on page 5 • 3PC, on page 6 • 4CHAN, on page 7 • 58-CITY, on page 8 • 914C G, on page 9 • 9PFS, on page 10 • ABC-NEWS, on page 11 • ACAP, on page 12 • ACAS, on page 13 • ACCESSBUILDER, on page 14 • ACCESSNETWORK, on page 15 • ACCUWEATHER, on page 16 • ACP, on page 17 • ACR-NEMA, on page 18 • ACTIVE-DIRECTORY, on page 19 • ACTIVESYNC, on page 20 • ADCASH, on page 21 • ADDTHIS, on page 22 • ADOBE-CONNECT, on page 23 • ADWEEK, on page 24 • AED-512, on page 25 • AFPOVERTCP, on page 26 • AGENTX, on page 27 • AIRBNB, on page 28 • AIRPLAY, on page 29 • ALIWANGWANG, on page 30 • ALLRECIPES, on page 31 • ALPES, on page 32 • AMANDA, on page 33 • AMAZON, on page 34 • AMEBA, on page 35 • AMAZON-INSTANT-VIDEO, on page 36 Protocols: 0-9, A 1 Protocols: 0-9, A • AMAZON-WEB-SERVICES, on page 37 • AMERICAN-EXPRESS, on page 38 • AMINET, on page 39 • AN, on page 40 • ANCESTRY-COM, on page 41 • ANDROID-UPDATES, on page 42 • ANET, on page 43 • ANSANOTIFY, on page 44 • ANSATRADER, on page 45 • ANY-HOST-INTERNAL, on page 46 • AODV, on page 47 • AOL-MESSENGER, on page 48 • AOL-MESSENGER-AUDIO, on page 49 • AOL-MESSENGER-FT, on page 50 • AOL-MESSENGER-VIDEO, on page 51 • AOL-PROTOCOL, on page 52 • APC-POWERCHUTE, on page 53 • APERTUS-LDP, on page 54 • APPLEJUICE, on page 55 • APPLE-APP-STORE, on page 56 • APPLE-IOS-UPDATES, on page 57 • APPLE-REMOTE-DESKTOP, on page 58 • APPLE-SERVICES, on page 59 • APPLE-TV-UPDATES, on page 60 • APPLEQTC, on page 61 • APPLEQTCSRVR, on page 62 • APPLIX, on page 63 • ARCISDMS, -
Download Resume
Oji Udezue http://www.linkedin.com/in/ojiudezue . +1 425-829-9520 SUMMARY: EXPERIENCED PRODUCT, DESIGN & TECHNOLOGY EXECUTIVE I’m a product-led growth expert. A multi-disciplinary tech exec with strong product, design and engineering leadership skills. I have had stints in marketing and sales which provide a well - rounded experience of key business functions. In addition, I have startup experience and a track record advising several great startups. I have a talent for new product strategy and the practical leadership to innovate and execute with conviction. I am passionate about early stage product development and entrepreneurship in organizations. My strongest skill sets are product vision, lean product management; strategy & planning, people management and talent development. Professional Experience CALENDLY VP of Product (2018 – Present) Lead Technology, Product, Design and Content Strategy • Under my tenure, Calendly is sustaining 100% year on year growth in ARR and MAU • Drive key engineering investments and a high-performance engineering culture • Set product vision, mission and goals for business • Drive ongoing, high velocity innovation • Manage overall user experience and delivery of value to customers • Manage team health, product craft excellence and talent acquisition • Drive clear and actionable business metrics and management of business to those metrics • Drive acquisition strategy; review and approve potential acquisition deals • Manage growth program and virality initiatives to increase audience share ATLASSIAN Head -
Atlassian, a Devops Leader, Partners with Protiviti to Deliver Cutting-Edge IT Controls Across Its Environment
CLIENT STORY Atlassian, a DevOps leader, partners with Protiviti to deliver cutting-edge IT controls across its environment Technology companies compete on their ability to quickly develop, deliver and update quality systems and software. This need for speed has led solution providers to abandon the traditional “waterfall” software development Keys to Success methodology in favor of Agile and DevOps, a faster and more collaborative approach that ultimately aims to enable faster time to market and a more reliable product. However, many organizations have struggled to apply Change requested traditional IT control frameworks within an Agile/DevOps environment, and the Embed control activities into Agile two are often misconceived as being incompatible. processes without compromising speed of delivery Atlassian, a global software development company responsible for creating Change envisioned team collaboration and productivity tools — including Jira, Confluence, Trello, Stride and BitBucket, among others — recognizes that trust is Combine Protiviti’s IT, risk and increasingly at the forefront of customer adoption considerations, and that compliance expertise with Atlassian’s key to demonstrating trustworthiness is being transparent with compliance. culture of innovation to design In addition, when it listed on the NASDAQ market in the United States in best-in-class controls in a DevOps December 2015, Atlassian needed to be in a position to demonstrate effective environment controls to its investors. Change achieved Embedded, automated controls -
TEAM Q4-2019 Shareholder Letter
Shareholder Letter Q4 FY19 and Fiscal 2019 | July 25, 2019 From the CEOs Fellow shareholders, Fiscal 2019 was another outstanding year for Atlassian. We surpassed 150,000 customers and vaulted past the $1 billion revenue mark for the first time in a fiscal year. This year also saw a number of important advances in our products aimed to better serve our customers: Trello Trello reinforced its status as a go-to collaboration tool in the workplace, serving more than 80% of the Fortune 500. In Okta's 2019 Businesses @ Work report, Trello was cited as the most widely adopted project management app at work. We introduced powerful organization-wide features for Trello Enterprise and made automation a more integral part of Trello with the addition of Butler for Trello. Jira family We improved the overall user experience of our Jira product family by simplifying the interface for new users and enhancing features for more advanced users. This combination of simplicity and power keeps Jira Software the industry standard for managing work in software teams. Cloud for We introduced an early access program for large enterprises, expanding enterprises support from 5,000 to 10,000 users. Cloud We introduced an early access program for Cloud Premium Editions of Jira Premium Software and Confluence targeting more sophisticated and larger customers. These new editions combine advanced end-user features with additional platform capabilities around uptime, service levels and data storage. Access We saw continued momentum from one of our newest products, Atlassian Access. Access provides company-wide security and policy administration across multiple Atlassian products, and already supports hundreds of thousands of users in its first year. -
A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case
A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case Syed Ghazanfar Abbas, Shahzaib Zahid Faisal Hussain Ghalib A. Shah, Muhammad Husnain Al-Khawarizmi Institute of Computer Al-Khawarizmi Institute of Computer Al-Khawarizmi Institute of Computer Science (KICS) Lahore, Pakistan Science (KICS) Lahore, Pakistan Science (KICS) Lahore, Pakistan [email protected] [email protected] [email protected] [email protected] [email protected] Abstract—Despite the surging development and utilization of hardcoded, or guessable passwords, lack of security updates, IoT devices, the security of IoT devices is still in infancy. The etc. [5]. The attackers first exploit these vulnerabilities, then security pitfalls of IoT devices have made it easy for hackers bypass the user’s privacy and information and finally use the to take over IoT devices and use them for malicious activities like botnet attacks. With the rampant emergence of IoT devices, victim IoT device to perform different malicious activities botnet attacks are surging. The botnet attacks are not only ranging from shutting down service to control over end devices catastrophic for IoT device users but also for the rest of the world. [6]. Therefore, there is a crucial need to identify and mitigate the The rampant emergence of IoT devices caused the ignorance possible threats in IoT devices during the design phase. Threat of security threats to large extent [6]. The security pitfalls modelling is a technique that is used to identify the threats in the earlier stages of the system design activity. -
The Best Online Communities
THE Welcome to our annual list of top brand communities. THE BEST COMMUNITIES From July 2020 to Sept 2020, FeverBee analysed hundreds BY PLATFORM BEST ONLINE of communities in a variety of sectors to put together our list of top communities. KHOROS SALESFORCE VERINT COMMUNITIES 1 Atlassian Salesforce: Trailblazers Sophos The criteria to compile these rankings is subjective, but based 2 Sephora Kronos Sage City upon several factors. These include quantity of activity, quality 3 Fitbit Big Commerce Dynamics of activity and management, value to members, value to 4 Digital Ocean Activision Macmillan the organisation, design, superuser programs, and more. 5 Spotify MuleSoft Nordic Semiconductor 2020 6 SAS Hive Titleist While this list focuses on traditional, hosted, brand 7 Alteryx Workfront Appian 8 BT Tableau Texas Instruments By Richard Millington, FeverBee communities, we’ve also included cult brands and 9 Google Local Guides Akamai ARM ‘community-only’ brands which primarily exist only 10 eBay Boomi Technologies (Dell) England Supporters as a community. NOTE: INSIDED VANILLA DISCOURSE We recognise this is not a fully representative list. Non-English speaking communities, private communities, and those on platforms which are less common in the Western 1 Sonos Money Saving Expert Glamour.de world are not represented. 2 hLife Acer Nvidia 3 02.de Gardners World Babypips 4 Ziggo Qualtrics Asana 5 T-Mobile Digital Spy GitHub THE BEST COMMUNITIES 6 KPN Tuenti Schizophrenia BY CATEGORY 7 Tele2 King Plex 8 A1Community Startup Nation Zoom 9 Deezer Vertica Swapd OVERALL B2B B2C NON-PROFIT 10 Zapier Big Green Egg Nature Photographers 1 Atlassian Atlassian Sephora Mayo Clinic 2 Salesforce: Trailblazers Salesforce: Trailblazers Fitbit Inspire 3 Sephora Tableau Apple Breast Cancer 4 Fitbit SAP BT TuDiabetes 5 SAP Kronos Spotify Reachout 6 Kronos Digital Ocean Acer Macmillian 7 Digital Ocean Project Management Institute Etsy Schizophrenia.com THE BEST 8 Apple SAS Blizzard Scope.uk 9 Project Management Institute Service Now Steam Sane Australia MISC. -
Menu of Services System Source Benefits
3yea7 rs System Source has provided consulting services since 1981. We manage projects using a single point of contact and accountability for procurement, installation, consulting support, maintenance, cloud services, training and presentation systems. “System Source provides a wide variety of expertise and experience. By keeping all our systems at 99.9%+ uptime they are a vital part of our daily operations. They are also an invaluable asset in our strategic planning.” Peter Smith, CFO MTC Logistics Menu of Services System Source Benefits Cloud Readiness – Return on investment calculation, Expertise - Our 25 technicians and engineers hold plan for implementing and managing a migration to public, certifications with top manufacturers: private, or hybrid designs including Public Cloud, Office 365, • Amazon Web Services (AWS) – Consulting Partner SharePoint and Teams. • Atlassian – Experts Program Cloud Optimization – Understand if your Cloud • Citrix – Silver Partner, Citrix XenDesktop environment is configured appropriately for cost, utilization, • Comcast – Business Class Program and security. • Dell – Storage Certification, Server Certification, Security – Understand where vulnerabilities exist, what Networking Specialization, Systems Management steps to take, and in what order. Penetration testing, data Specialization, Security Specialization security, firewalls, VPN and other remote access. • EMC – Velocity Solution Provider Program, Information Protect (Backup and Recovery Specialty), Unified Storage Cloud Migrations – Migrate to -
Businesses at Work Powered by March 2021
Supplement for the GGV Capital Evolving Enterprise Conference Businesses at Work powered by March 2021 Okta, Inc. okta.com [email protected] Businesses at Wor k Contents 3 Introduction 4 Methodology: how did Okta create this report? 5 Apps at work: our most popular apps 8 The fastest growing apps 10 Remote work 12 Developers at work 15 Looking forward, moving ahead Businesses at Wor k 3 Welcome to a supplemental Businesses at Work report, prepared for the GGV Capital Evolving Enterprise conference. Our report dives into how organizations and people work today — exploring workforces and customers, and the applications and services they use to be productive. Our most recent annual Businesses at Work report launched in January 2021. This update dips into fresh data, revealing some important changes in how companies are gearing up for 2021. Last spring, as the pandemic became a global concern, our worlds were flooded with change. We turned to technology to stay afloat. Families scrambled to get equipped for remote learning, companies rushed to support their remote workforces, and organizations quickly developed new online experiences for customers. As the pandemic accelerated, tech solutions once preferred only by “early adopters” became survival tools for companies across all industries, and the population as a whole. It’s from this unprecedented lens that we view the data from Okta’s more than 10,000 customers and the Okta Integration Network (OIN), which includes over 7,000 integrations with cloud, mobile and web apps, as well as IT infrastructure providers. Our top apps underscore the new necessities of remote work: collaboration, security, employee engagement.. -
Quarterly Holdings Report for Fidelity® Growth Strategies Fund
Quarterly Holdings Report for Fidelity® Growth Strategies Fund February 28, 2021 FEG-QTLY-0421 1.797938.117 Schedule of Investments February 28, 2021 (Unaudited) Showing Percentage of Net Assets Common Stocks – 99.1% Shares Value (000s) COMMUNICATION SERVICES – 4.4% Entertainment – 2.8% Electronic Arts, Inc. 210,000 $ 28,134 Take‑Two Interactive Software, Inc. (a) 340,000 62,716 90,850 Interactive Media & Services – 1.6% Bumble, Inc. 16,300 1,097 Match Group, Inc. (a) 324,300 49,569 50,666 TOTAL COMMUNICATION SERVICES 141,516 CONSUMER DISCRETIONARY – 7.3% Distributors – 1.1% Pool Corp. 105,000 35,151 Hotels, Restaurants & Leisure – 0.6% Domino’s Pizza, Inc. 55,900 19,370 Household Durables – 1.4% D.R. Horton, Inc. 114,500 8,802 Lennar Corp. Class A 66,100 5,484 NVR, Inc. (a) 1,650 7,426 Tempur Sealy International, Inc. 732,100 24,459 46,171 Internet & Direct Marketing Retail – 1.6% eBay, Inc. 207,100 11,685 Etsy, Inc. (a) 175,600 38,679 50,364 Multiline Retail – 0.8% Dollar General Corp. 143,000 27,026 Specialty Retail – 1.8% AutoZone, Inc. (a) 14,200 16,471 Best Buy Co., Inc. 257,200 25,810 Tractor Supply Co. 63,003 10,015 Williams‑Sonoma, Inc. 40,300 5,291 57,587 TOTAL CONSUMER DISCRETIONARY 235,669 CONSUMER STAPLES – 4.6% Beverages – 1.5% Boston Beer Co., Inc. Class A (a) 25,300 26,026 Brown‑Forman Corp. Class B (non‑vtg.) 303,099 21,696 47,722 Quarterly Report 2 Common Stocks – continued Shares Value (000s) CONSUMER STAPLES – continued Food Products – 1.5% Bunge Ltd. -
The Direct Listing As a Competitor of the Traditional Ipo
The Direct Listing As a Competitor of the Traditional Ipo Research Paper – Law & Economics Course (IUS/05) Degree: Economics & Business, Dipartimento di Economia e Finanza Academic Year: 2019-2020 Name: Ludovico Morera Student Number: 216721 Supervisor: Prof. Pierluigi Matera The Direct Listing as a Competitor of the Traditional Ipo 2 Abstract In 2018, Spotify SA broke into the NYSE through an unusual direct listing, allowing it to become a publicly traded company without the high underwriting costs of a traditional Initial Public Offering that often deter companies from requesting to list. In order for such procedure to be possible, Spotify had to work closely with NYSE and SEC staff, which allowed for some amendments to their implementations of the Securities Act and the Securities Exchange Act. In this way, Spotify’s listing was done within the limits imposed by the U.S. market authorities. Several rumours concerning the direct listing arose, speculating that it may disrupt the American going public market and get past the standard firm-commitment underwriting procedures. This paper argues that these beliefs are largely wrong given the current regulatory limitations and tries to clarify for what firms direct listing is actually suitable. Furthermore, unlike the United Kingdom whose public exchanges have some experience, the NYSE faced such event for the first time; it follows that liability provisions under § 11 of the securities Act of 1933 may be attributed in different ways, especially due to the absence of an underwriter that may be held liable in case of material misstatements and omissions upon the registered documents. I find out that the direct listing can substitute the traditional IPO partially and only a restricted group of firms with some specific features could successfully do without an underwriter. -
Press Release EARLYBIRD INVESTS in CLOUD TECHNOLOGY
Press Release EARLYBIRD INVESTS IN CLOUD TECHNOLOGY STARTUP AIVEN ● Aiven receives $40 million in Series B funding ● The Helsinki based startup uses the new capital to further accelerate its growth in the US and to expand its product portfolio faster ● Aiven provides a portfolio of open source stream processing and database services Munich, Germany, 05th February 2020 – Aiven, a leading cloud technology startup providing a portfolio of open source stream processing and database services, today announced that it has closed $40 million in Series B funding. The round is led by the Silicon Valley-based venture capital firm Institutional Venture Partners (IVP) with participation from Earlybird and other investors. Earlybird is part of Aiven’s entrepreneurial journey since joining the Series A round in May 2019. Aiven experienced impressive growth in 2019, adding 200 new customers, tripling its revenues run rate, doubling its headcount and opening two new offices in Berlin, and Sydney. With the new funding, Aiven plans to further accelerate its growth in the U.S. by expanding its presence in Boston and opening an additional office in San Francisco Bay Area. The investment will allow the company to expand its product portfolio faster with new services such as the M3 time series database and Apache Flink stream processing engine. “As a financial investor we are strongly convinced that Aiven is fully on track to build their vision of a single open-source data cloud that serves all database needs for customers of all sizes,” says Hendrik Brandis, Partner at Earlybird. “We are proud to accompany Aiven also in its Series B round and to support them on their successful entrepreneurial journey. -
Assessing the Security of Android Dating Apps Värdering Av
DEGREE PROJECT IN COMPUTER ENGINEERING, FIRST CYCLE, 15 CREDITS STOCKHOLM, SWEDEN 2020 Assessing the Security of Android Dating Apps Värdering av säkerheten i dating- appar för Android HAMPUS HAUFFMAN ADAM MEYER KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF ENGINEERING SCIENCES IN CHEMISTRY, BIOTECHNOLOGY AND HEALTH Assessing the Security of Android Dating Apps HAMPUS HAUFFMAN, ADAM MEYER Degree Programme in Computer Engineering Date: June 7, 2020 Supervisor: Shahid Raza Examiner: Ibrahim Orhan School of Engineering Sciences in Chemistry, Biotechnology and Health Swedish title: Värdering av säkerheten i dating-appar för Android iii Abstract Dating apps are continuously becoming a larger part of the social media mar- ket. Like any social media app, dating apps utilize a large amount of personal data. This thesis analyzes two dating apps and how they handle personal infor- mation from a security and privacy standpoint. This was done by conceptual- izing a threat model and then validating the threat through penetration testing on both of the apps in an attempt to find security vulnerabilities. This analysis proves that there is a substantial difference in whether or not app developers take security seriously or not. It was found that in one of the two apps analyzed, gaining access to personal data was particularly more trivial than expected, as TLS or other encryption were not implemented and server-side authorization was lacking in important app features like the one-to-one user chat. Keywords – Penetration testing, ethical hacking, dating apps, Android, reverse engineering, threat modeling, risk rating iv Sammanfattning Dating-appar blir kontinuerligt en större del av moderna sociala medier.