Remove Architecture Remove Banking Remove Systems Administration
article thumbnail

20 powerful women shaping the networking industry

Network World

Her resume includes stints at Deloitte Consulting, USB Investment Bank, Red Hat, Oracle, GE Digital, and Microsoft. Throughout her career, she developed a level of expertise in cybersecurity and compliance, enterprise architecture and road mapping, data, and analytics. She has worked in media, communications, and networking industries.

Network 390
article thumbnail

What CIOs Can Learn From Bank of America’s Trip Into The Cloud

The Accidental Successful CIO

Bank Of America is slowly moving into the cloud Image Credit: Mike Mozart. Just imagine if you were David Rilly, chief technology officer at Bank of America. There you are, in charge of the IT infrastructure for one of the biggest banks around when all of a sudden the IT world starts to undergo yet another one of its transformations.

Banking 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IBM Acquires CSL to Advance the Cloud on System z » Data Center.

Data Center Knowledge

IBM boosts its System z portfolio by acquiring CSL International, Actian leverages previous acquisitions to launch new cloud and big data platforms and EastWest Bank selects HP to build a private cloud for updating its infrastructure. HP builds private cloud for EastWest Bank. By: John Rath July 12th, 2013. LinkedIn.

article thumbnail

Modernizing the mainframe for the digital era

CIO Business Intelligence

I’m a banking technologist,” says the CIO for retail, business, and digital banking at M&T Bank. He’s doing just that on the bank’s IBM Z system mainframes, for which the bank has written some 10 million lines of code over the years. Each houses an IBM z15 system. M&T Bank.

IBM 360
article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

But they constrain architectural choices to ensure that the universal identity metasystem is not just usable, but also safe and secure. Messaging —the architecture must support messaging between the parties to those relationships. Relationships are created using a system of peer-to-peer agents in Layer 2.

Internet 102