This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
As a result, many organizations will prioritize strategies that ensure swift and secure recovery, such as immutable backups, advanced recovery planning and redundant systems designed to minimize downtime. Paying a threat actor fails to remove legal liability for data breaches, and there’s no assurance that data will be deleted as promised.
Gregg Ostrowski , Regional CTO at Cisco AppDynamics : The biggest opportunity comes with the addition of “biz.” Rick Vanover , Senior Director Product Strategy, Veeam : There is an incredible opportunity for traditional IT organizations to align to the DevSecOps practices today as well as work to modernize legacy platforms.
She has over 18 years of experience in software industry as an author, speaker, mentor, consultant, technology leader and developer. Maria Gutierrez is a VP of Engineering and an excellent example of Scotland’s commitment to employing women in the STEM sector. LinkedIn. 8 – Maria Gutierrez. LinkedIn.
This is a talk about what you do, as VP of Engineering, when somebody asks for the impossible. But what about big-picture strategy? At my company, strategy is decided by our Leadership team, which consists of our CEO and heads of Product, Marketing, Sales, Partners, Content, Finance, and so forth. It cant be done.
You can find a lot of useful information about DevOps and related technology topics in his Twitter account. John is a consultant and helps companies with Devops, Puppet, Docker, Kubernetes, etc. CTO at Devops-research.com and twitter activist. He also advises C-suite executives on value-adding technologystrategies.
Frankly, I don’t know a single CIO, CTO or VP of Engineering or Operations that would disagree with me. Furthermore, should a regional deployment strategy not work out for the business, the technical budget is left holding the proverbial bag. Public cloud is not cheaper! There, I said it!
And I remember feeling that way, at every stage of management, you know not just as a new line manager, but when I became a manager of managers, and then when I became a VPE. My favorite way to do this is totally ripped off from the former CTO of Meetup, Yvette Pasqua. She hired me to be a fractionalVP of Engineering at Meetup.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content