article thumbnail

Capsule gets $1.5M to build ‘super simple’ decentralized social media

TechCrunch

” Cryptocat author gets insanely fast backing to build P2P tech for social media. Given the intent with TIC is to hosts all sorts of decentralized apps it’s possible — indeed, likely — that a bunch of decentralized social media plays will emerge. Polychain Capital outted its Beacon Fund last September.

Media 246
article thumbnail

Elodie Games obtains $32.5M round to make social co-op gaming better

TechCrunch

But a social, cooperative, fun and cross-platform gaming experience is remarkably hard to find — and Elodie Games is here to change that. Most social multiplayer gamers are segmented by platform, time investment, purchases or skill in a way that limits who you can play with, and how you can play with them.

Games 222
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why GreenOps will succeed where FinOps is failing

CIO

The result was a compromised availability architecture. GreenOps promotes practices that deliver both cost savings and sustainability benefits, aligning with corporate social responsibility (CSR) goals and enhancing brand value. Long-term value creation. Cultural shift.

article thumbnail

Mastering technology modernization: 6 steps for building your road map

CIO

The topics of technical debt recognition and technology modernization have become more important as the pace of technology change – first driven by social, mobile, analytics, and cloud (SMAC) and now driven by artificial intelligence (AI) – increases. Which are not longer an architectural fit? Which are obsolete?

article thumbnail

Coach your Architects in Agile Architecture!

Xebia

Some companies ignore architects in their transformation, some will upskill their architects, and some will make the DevOps teams responsible for the architecture. A core problem we see is that those responsible for the transformation have little experience dealing with architecture in an agile way.

Coaching 130
article thumbnail

3 Cybersecurity Technologies You Should Know

The Crazy Programmer

The majority of cyber-attacks actually use phishing or social engineering, where users are tricked into revealing personal information. The concept of Zero Trust Architecture (ZTA) is that no implicit user trust is provided to accounts or devices based on their location or the location of the network or apps.

article thumbnail

Microservices Architecture: Navigating the Buzz

Dzone - DevOps

Lately I’ve been exploring what all the talk around "microservices architecture" is really about. Microservices in a Nutshell If you are not already familiar with monolithic vs. microservices architecture, you could imagine your software application as a structure made of Lego bricks.