Cockroach Labs announces $27M Series B and enterprise tier for its reliable database

 “A database that replicates itself and is meant to survive” — that was the connection that Cockroach Labs CEO Spencer Kimball made between the startup’s memorable name and its value proposition. Despite entering a crowded market, Cockroach has been able to gain the favor of some of the most well known VCs in tech. Today’s $27 million Series B is being led by… Read More Continue reading Cockroach Labs announces $27M Series B and enterprise tier for its reliable database

Big data expert Flavio Villanustre talks about the future of massive data stores

Flavio Villanustre is an expert in Big Data. He and his team at an offshoot of LexisNexis created a massive open source product aimed at allowing first-timers to spin up huge data stores. The product, called HPCC, is a way to bring parallel computing a… Continue reading Big data expert Flavio Villanustre talks about the future of massive data stores

Is the Ethereum blockchain truly a tamper-proof way to deploy distributed applications?

The Ethereum website says that it provides a “cryptographically secure, decentralized, tamper-proof network” on which applications written in the Solidity contract language could be deployed. (https://www.ethereum.org)

Is Ethereum really … Continue reading Is the Ethereum blockchain truly a tamper-proof way to deploy distributed applications?

What are the drawbacks of non-PKI or distributed Key Management systems?

I just came across the Milagro project which seems to be solving some of the limitations introduced by PKI (centralized trust authorities with single point of failure hard-to-revoke root keys, using X.509 for identity) by int… Continue reading What are the drawbacks of non-PKI or distributed Key Management systems?

How does Jami (formerly Ring.cx) really work, and how secure is it?

Jami calls itself “ultimate privacy and control for your voice, video and chat communications”. But forums online mentioned in passing (little depth) that it uses bad cryptography protocols and has messy source code. What exactly is insecu… Continue reading How does Jami (formerly Ring.cx) really work, and how secure is it?