Media Database
>
Jon Collins

Jon Collins

Vice President of Research/Blogger at GigaOm

Contact this person
Email address
t*****@*******.comGet email address
Influence score
46
Location
United States
Languages
  • English
Covering topics
  • Computers & Technology
  • Security

View more media outlets and journalists by signing up to Prowly

View latest data and reach out all from one place
Sign up for free

Recent Articles

gigaom.com

5 questions for Koby Avital: on business-first transformation and ... - Gigaom

Your industry partner in emerging technology research
gigaom.com

Heads up: New Research Calendar for GigaOm Radar Reports - Gigaom

Your industry partner in emerging technology research
gigaom.com

Seven reasons why generative AI will fall short in 2024 - Gigaom

Your industry partner in emerging technology research
gigaom.com

Five security, networking and management predictions for 2024 - Gigaom

Your industry partner in emerging technology research
gigaom.com

2024 predictions redux: data, storage, infrastructure, and services...

Your industry partner in emerging technology research
gigaom.com

On Microsoft's Radius, and building bridges between infra, dev and ...

Your industry partner in emerging technology research
gigaom.com

Digital Transformation Not Working? Here’s a Five-Point Plan That C...

Your industry partner in emerging technology research
gigaom.com

Operations Leadership Lessons from the Crowdstrike Incident

Operations Leadership Lessons from the Crowdstrike Incident
gigaom.com

DevOps, LLMs, and the Software Development Singularity

A Brief History of DevOps To understand the future of DevOps, it’s worth understanding its past—which I can recall with a level
gigaom.com

Bridging Wireless and 5G

Wireless connectivity and 5G are transforming the way we live and work, but what does it take to integrate these technologies? I
gigaom.com

Making Sense of Cybersecurity – Part 1: Seeing Through Complexity

At the Black Hat Europe conference in December, I sat down with one of our senior security analysts, Paul Stringfellow. In this