Women and Cloud Computing, Part II: Four Leading Ladies in the Cloud Conversation

Women and Cloud Computing, Part II: Four Leading Ladies in the Cloud Conversation

This series of articles shines a light on impactful female figures in cloud computing and seeks to spark a conversation on the place of women in technology.

Two thousand twelve looks to be a breakout year for several standout members of the cloud computing community, all of whom just happening to be of the female persuasion. Anticipate big things from this dynamic quartet throughout the year.

Vanessa Alvarez

As an analyst for Forrester Research, Ms. Alvarez has consistently developed a formidable reputation as an expert on storage architecture and strategy. Last year, The Next Web hailed her as one of twenty-five most influential people in cloud computing in terms of Twitter activity; Alvarez earned an enviable PeerIndex score of 66, a well-respected indicator of authority and trustworthiness.

Her stance at the vanguard of cloud computing as it evolves has allowed her to straddle both social media and traditional news; Bloomberg TV, Forbes, and CNNMoney are just a few of the prestigious outlets who regularly seek out her opinion on all things cloud.

Denise Dubie

Multihyphenate Dubie — an editor of impressive sources such as CIO.com, writer for outlets like ComputerWorld, and technological whiz — also factored among TNW’s major leagues of cloud computing voices. She primarily concentrates her opinion on issues of service assurance, management of information technology, and automation. Dubie currently serves as the New Media Principal at CA Technologies and maintains the crisp and comprehensive blog site, Service Assurance Daily.

Riitta Raesmaa

A 67 score on PeerIndex underscores the heft of Ms. Raesmaa’s notoriety and industry-wide respect. This Helsinki-born entrepreneur locates the cloud among the other critical components in the constellation of current technology: enterprise 2.0, social media, and SaaS. “Always in beta,” as is her motto, Raesmaa maintains a bilingual blog (readable in both English and Finnish), @Raesmaa. The self-professed bookworm also served as a founding partner for Sopima.

Renee Schmidt

Schmidt, a dynamo in the conversation on women in technology, helms the popular blog SheBytes. She also co-founded major New York City cloud host Madison Technology, which continues to earn clout as a major provider of Infrastructure as a Service, or IaaS. The cloud computing guru emphatically examples how women can comport themselves as ladies without sacrificing technological authority; Schmidt’s affinity for stilettos has yet to stop junkets like Fox News from enlisting her point of view on the cloud and female entrepreneurship.

Read: Women and Cloud Computing, Part I

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…