Remove 2000 Remove Database Remove Founder Remove Software Developers
article thumbnail

This Week in VC Episode 6 with @Jason Calacanis: Best One Yet

Both Sides of the Table

He is the author of “ Joel on Software ” and I was a reader nearly 10 years ago when I had never heard of Fred Wilson, Brad Feld and VentureHacks didn’t exist. Invidi is based in New York and founded in 2000. Swipely – Blippy competitor founded by TellMe founder, Angus Davis, in Fall 2009.

Stealth 285
article thumbnail

Software Inventory

www.joelonsoftware.com

The bug database is obviously a great thing to have. When you look closely you realize that months or years of work has gone into preparing those bug reports, and you ask yourself, how could we have 3000 bugs in the database while our product is delightful and customers love it and use it every day? © 2000-2012 Joel Spolsky.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

In Silicon Valley, Founders Fight for Control

online.wsj.com

Andreessen Horowitz is telling entrepreneurs it prefers situations where the founders have controlling stakes, reckoning that theyll be better able to resist outside distraction and focus on making great products. One of its champions includes Jason Goldberg, the co-founder and CEO of online design retailer Fab.com Inc., Stock Quotes.

article thumbnail

Scaling is Hard, Case Study: TripAdvisor

Seeing Both Sides

Founded in 2000 by Stephen Kaufer and Langley Steinert, Boston-based TripAdvisor is a travel website that provides reviews and other information for consumers about travel destinations around the world. Big Data meets travel…in 2000. TripAdvisor, in effect, was a model lean start-up with an engineering-driven, product-focused founder.

article thumbnail

What The Rails Security Issue Means For Your Startup

www.kalzumeus.com

Kalzumeus Software. Patrick McKenzie (patio11) blogs on software development, marketing, and general business topics. You can assume the attacker now has a copy of your source code, all credentials you have, all your databases, and all information you had like e.g. log files. Well, if they have database backups.).

Security 101