Remove Architecture Remove Database Administration Remove Resources
article thumbnail

20 powerful women shaping the networking industry

Network World

During her tenure, the company successfully made the transition from simple anti-virus software to a broad, AI-driven cybersecurity platform that protects endpoints, cloud, and enterprise resources. Fun fact: She is the head of the Women at IBM Community and started the companys Womens Business Resource Group. billion range.

Network 391
article thumbnail

CIOs take note: Platform engineering teams are the future core of IT orgs

CIO Business Intelligence

They may also ensure consistency in terms of processes, architecture, security, and technical governance. The core roles in a platform engineering team range from infrastructure engineers, software developers, and DevOps tool engineers, to database administrators, quality assurance, API and security engineers, and product architects.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A DBA's Big Data Wish List

IT Toolbox

Like management information systems, enterprise resource planning and relational database, big data is now a standard part of information technology architecture for most large organizations. As a database administrator, , I have the following items

Big Data 100
article thumbnail

What is a CTO? The exec who sets tech strategy

CIO Business Intelligence

The CTO title is more challenging to define today than ever before.” [ Related: Career roadmap: Chief technology officer ] CTO job description CTOs oversee the effectiveness of technology resources within an organization, including everything from phone systems to enterprise software platforms.

article thumbnail

16 best entry-level IT certifications to launch your career

CIO Business Intelligence

The exam covers topics such as coding, designing cloud architecture, cloud security, troubleshooting, implementation, migration, load and performance testing, and business applications. Part of that is having a deep understanding of the tools, resources, and practices that hackers lean on to exploit IT vulnerabilities.

SCRUM 338
article thumbnail

Are You Agile Enough for Polyglot Programming?

CTOvision

Harper Reed's Amazon Architecture. Harper Reed , the CTO for the Obama re-election campaign , knew from the beginning he was resource constrained, so he bet big on the cloud. So rather than using a rigid architecture with fixed standards, he decided to leverage the varied resources of his volunteer. Polyglot Programming.

Agile 150
article thumbnail

Zero Trust, Least Privilege, and Just-in-Time Access

Phil Windley

Standing privileges are characterized by persistent access regardless of whether the person is using the resource or not, predefined scope where role is used to define broad access, and minimal oversight with little monitoring and accountability. When this is extended to partners, suppliers, and other services, the problem is that much worse.