IBM (Nasdaq: IBM) delivered a surprising performance for its fourth quarter. Not only did the company manage to surpass market expectations, but also delivered a y-o-y growth in revenue – a first for it in the last six quarters.>>>
Sramana Mitra: What is the preferred check size for your fund?
Anand Rajaraman: We write about $2 million to $3 million checks, which means that we could co-lead in the US. In foreign geographies, we might even be the lead. In a B round, we follow.>>>
According to an IDC research report, worldwide revenues for Big Data and business analytics solutions grew 12% to $189.1 billion in 2019 and is expected to grow at 13% CAGR to $274.3 billion by 2022. Redwood City-based Sumo Logic is a Unicorn in the market.>>>
In case you missed it, you can listen to the recording here:
Sramana Mitra: What is the fund size of rocketship.vc?
Anand Rajaraman: We are on fund two. It’s $120 million. Fund one was a $40 million fund. That’s fully deployed. We started investing fund one around late 2015. We have about 30 odd companies in the portfolio. We’ve just started deploying fund two.>>>
Entrepreneurs are invited to the 469th FREE online 1Mby1M mentoring roundtable on Thursday, January 23, 2020, at 8 a.m. PST/11 a.m. EST/5 p.m. CET/9:30 p.m. India IST.
If you are a serious entrepreneur, register to “pitch” and sell your business idea. You’ll receive straightforward feedback, advice on next steps, and answers to any of your questions. Others can register to “attend” to watch, learn, and interact through the online chat.
You can learn more here and register to pitch or attend here. Register and you will receive the recording by email, even if you are unable to attend. Please share with any entrepreneurs in your circle who may be interested. All are welcome!
According to a Markets and Markets report, the global enterprise collaboration market is expected to grow 9% over the year to $48.1 billion by 2024 from $31 billion in 2019. Last month, Seattle-based Smartsheet (Nasdaq: SMAR) announced its third quarter results that surpassed market expectations.>>>
Ran Ilany: The second thing that we’re doing is authenticating the communication of those workloads. That is to say, the actual identity of the workload is injected into the traffic stream so that every connection would be, first and foremost, authenticated and would then be authorized.
The whole notion here is moving from IP port and protocol to workload identity that can be authenticated at runtime. This is what we call the runtime protection.>>>