| Name | Title | Contact Details |
|---|---|---|
Artsiom Strok |
VP of Engineering | Profile |
Keith Rabkin |
Chief Revenue Officer | Profile |
We develop Scylla, a Cassandra compatible NoSQL database, at 1MM transactions/sec per server. At ScyllaDB, we carefully apply low-level knowledge to our Big Data technology. Data structures are measured not to cross CPU cachelines, poll-mode drivers are used instead of interrupts, disk accesses are measured for write amplification and caches need to be scan-resistant. We re proud of our very own task scheduler and TCP/IP kernel bypass. We hog the latest C++14 and gcc5.1 for latest and greatest and dream about commodity non-volatile random access memory. ScyllaDB, formerly known as Cloudius Systems, is an open source-centric company, led by the originators of the KVM hypervisor and employ superstar virtualization, database, and OS veterans. The ScyllaDB team is behind OSv and Seastar open source projects
Abacus Data Systems is a Rolling Meadows, IL-based company in the Software and Internet sector.
Powermate Software is a Rogue River, OR-based company in the Software and Internet sector.
Sequoia is a Reston, VA-based company in the Software and Internet sector.
Courion is the market leader in identity and access governance and administration (IGA), from provisioning to governance to identity analytics and intelligence (IAI). In 2015, Courion acquired Core Security to form the only company that can continuously and comprehensively monitor both infrastructure vulnerability and access risk. Core Security provides the industry`s first comprehensive attack intelligence platform offering advanced analytics to prioritize, validate and seek to eliminate security threats. Many of the world’s largest enterprises and organizations rely on Courion’s solutions to confidently provide an access governance process that ensures compliance to thousands of employees while protecting critical company data and assets from unauthorized access. Now with the addition of Core Security’s solutions, these same enterprises and security professionals can focus on the most likely threats to their business by modeling, simulating and testing the actions of an actual attacker.