Our New Low-Latency Streaming Network: Who Wants In?

August 10, 2017 by Dave Stubenvoll When we founded Wowza in 2005, our goal was to create the tools to deliver video and audio content seamlessly, and with greater stability and control. Twelve years and 20,000 customers later, Wowza has become the gold standard for an industry that is exploding Continue Reading

Don’t Take It from Us – FortiGate Enterprise Network Firewall Customer Reviews

Last year, Gartner launched a new website and service called Peer Insights. Its goal is to provide organizations looking at adopting new technologies or solutions with access to the collective knowledge and experience of IT professionals that have already evaluated and adopted similar technology. Their posted reviews offer detailed perspectives Continue Reading

Is SuiteCRM now the world’s most beautiful CRM?

 When we started the SuiteCRM project three years ago we had only one goal in mind: To create the world’s most powerful, flexible, fully-featured open source CRM. That took a lot of effort. From the Minimum Viable Product that comprised SugarCRM’s Community Edition, we added Quotes, Products, Contracts, Invoices, Events, Continue Reading

Launching Our Crowdfunding Campaign

Today we kicked off our first crowdfunding campaign with the goal of raising enough funds to cover about one month of our operations – $200,000. That amount covers the operational and engineering staff, the hardware and the software, and general operating expenses needed to securely and reliably issue and manage Continue Reading

Progress Towards 100% HTTPS, June 2016

Our goal with Let’s Encrypt is to get the Web to 100% HTTPS. We’d like to give a quick progress update. Let’s Encrypt has issued more than 5 million certificates in total since we launched to the general public on December 3, 2015. Approximately 3.8 million of those are active, Continue Reading

Using Context to Predict the Future

The vast majority of security strategies are reactive. The goal is to close the gap between the time to compromise and time to discover. According to the 2016 DBIR report, this compromise time is minutes for a majority (over 80%) of breaches. Solving this problem is complicated because threats are Continue Reading