CloudTweaks Interview With GigaSpaces

Interview With Mr. Adi Paz Of GigaSpaces

CloudTweaks had an opportunity this week to interview Mr. Adi Paz, EVP of Marketing & Business Development at GigaSpaces XAP.  Adi Paz is Executive Vice President of Marketing and Business Development, responsible for developing and communicating GigaSpaces’ strategy, managing the company’s go-to- market activities and its strategic alliances.  Prior to joining GigaSpaces, Adi served as Vice President of Marketing and Products and Vice President of Business Development at Radvision, specializing in selling and marketing solutions to the developer and enterprise markets. Adi also held senior Product Management and Business Development positions at Starhome, a Comverse company, focusing on the carriers market. Overall, Adi has over 18 years of experience in the Telecom space in business management, international marketing, strategic sales, channel development and products development. Adi holds a B.Sc. in Electrical Engineering from Ben Gurion University and a MBA from Tel-Aviv University.

Anthony Park:

What issues determine how you address platform reliability and performance from the perspective of your application offering?

Adi Paz:

With GigaSpaces eXtreme Application Platform, scalability, reliability and performance are key. XAP was designed to effectively use memory, ensuring applications can easily scale while its always-on capability prevents unplanned downtime even under extreme, unpredictable loads – and all of this while maintaining millisecond latency. XAP’s architecture insures that multicore processors are fully utilized, further speeding application processing.

XAP is based on space-based architecture, where application, data, and messaging run within a single conceptual processing unit distributed across as many physical and virtual machines as needed, leveraging RAM and processing resources as necessary and as available.

Anthony Park:

What is the new paradigm of cloud business models if any?  Put your “futurist hat” on and describe how you see the “cloud” evolving over the next ten years?

Adi Paz:

With regard to cloud business models, the ability to use the cloud significantly reduces entry barriers to technology start-ups. Previously, organizations had to invest hundreds of thousands of dollars in building the physical infrastructure before they could open the doors to the first customer. Today, once the application is built upon a platform like XAP, which allows for operation across any infrastructure – public and private clouds and/or the data center – without a single code change, it can be ported to wherever is most cost-effective until the customer volume or regulatory requirements grow such that a comprehensive data center must be built.

Anthony Park:

One of the key issues related to cloud SaaS applications is the complexity and management of the platform.  How has your firm addressed user training and support?

Adi Paz:

GigaSpaces XAP is a cloud enabler. XAP provides a common development environment, offering the power and flexibility to develop all applications, data, and messaging services such that they run within whatever hardware infrastructure your organization is using.  Using XAP significantly reduces platform development, implementation complexity, and long-term management. With regard to training and support, after basic training on using XAP, developers can immediately begin effective development. XAP also offers a number of APIs, such as SQL, JMS, JDBC, MAP, Memcached, Rest, and JPA, enabling developers to address more focused implementation scenarios with familiar design and development patterns, reducing the learning curve and time-to-market even further.

Anthony Park:

Thanks Adi.  CloudTweaks appreciates your comments and insight on these issues.

By Anthony Park

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

The Questions of Privacy In The Internet of Things Revolution

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet of Things Revolution The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting to see some of the big ideas come to fruition, which means an ever-growing conversation around data security and privacy. Big data comes with big responsibilities and…

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

5 Basic Safety Tips For Cloud Backups

5 Basic Safety Tips For Cloud Backups

Basic Cloud Backup Tips If you’re worried about the security of your data when it comes to cloud computing adoption, you’re not the only one. Industry experts claim that cloud computing data security is becoming an increasingly critical component in the data transmission process. And current mainstream services like Amazon’s EC2 just aren’t well-equipped enough…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…