Today’s FREE online 101st 1M/1M roundtable for entrepreneurs is starting in 30 minutes, on Thursday, October 13, at 11 a.m. EDT/8 a.m. PDT/8:30 p.m. IST. Click here to join. All are welcome!
Sramana Mitra: The iPad in particular is a device that’s being used by multiple people in a household. Let’s say it’s an iPad that belongs to a Fortune 500 employee but is also, in the evening or on the weekend, being used by the same person’s five-year-old son for completely different purposes. There needs to be
Jon Freeman: The next thing I would like to understand is the relationship of organizations, the users within the organizations to usage flow, and where people go. I see that people are moving, and I what I would like is to perceive wall and break them down. Is a user my employee, or is a
Entrepreneurs are invited to pitch their businesses or attend the 101st FREE online 1M/1M roundtable on Thursday, October 13, 2011, starting at 8 a.m. PDT/11 a.m. EDT/8:30 p.m. IST. You can find more details here and register here. All are welcome!
Sramana Mitra: I think we understand the business at this point and your core competencies and design principles. This series is part of the One Million by One Million effort, which is to help a million entrepreneurs reach $1 million in annual revenue around the world. A huge part of our audience are entrepreneurs who are
Entrepreneurs are invited to pitch their businesses or attend the 101st FREE online 1M/1M roundtable on Thursday, October 13, 2011, starting at 8 a.m. PDT/11 a.m. EDT/8:30 p.m. IST. You can find more details here and register here. Please join us, all are welcome!
Sramana Mitra: In terms of where it exists, are you saying that you also provide data center facilities to host a private cloud implementation of your solution? Jon Freeman: That’s correct. We have many customers today who may own data centers but also have either co-lo facilities or use service providers to host some of
Jon Freeman: The next design principle is that it has to be based on proven security technology. You can’t be inventing an authentication system or adopting authentication systems that haven’t been tried and tested. You have to be able to demonstrate that this software and the solutions and the services that you’re bringing forward are,