Heroes Of The Cloud – Part 7, Ladies Edition

Heroes Of The Cloud – Part 7, Ladies Edition

Heroes Of The Cloud – Part 7, Ladies Edition

When we think of the stereotypical IT worker, for better or worse, a certain image comes to mind. Fairly or not, we tend to think of some one who takes up IT as a profession as a grown up computer geek, either a very skinny or slightly over weight guy, in either case the result of too many hours in front of the screen resulting in not enough physical activity. This has also resulted in a need for corrective lenses, if your image of the IT worker included tape on the frame of his glasses, we will not argue.

A Man’s WorldJJ-DiGeronimo

The point is, although he may not be seen as the most masculine fellow, he will be in most cases a fellow, a guy, one of the male persuasion. There is a glaring gender gap in the IT world. The Department of Labor predicts that there will nearly 1.4 million computing and IT jobs available by 2020, so there is certainly an opportunity for women to join and advance in the IT world.

Whether they will or not remains to be seen. Since 1991, when women made up 36% of the IT workforce, the numbers have been declining. In 2011, less than 20% of the PhD graduates in computer science, computer engineering, and information science were female. Things were slightly more acceptable at the masteral level, with 30% of the graduates in those disciplines being women, but at the bachelor level only 13% of degrees were handed out to women.

Two Women To Listen To

Many observers feel that Cloud Computing will could make a huge difference in closing the IT gender gap. JJ DiGeronimo, director of Global Cloud Solutions at VMware writes “Cloud computing presents an opportunity for women who are not as heavily focused on the architectural design, and how bits and bytes move through the organization.” DiGeronimo is a 20 year veteran of IT, often in entrepreneurial leadership positions. “We’ll still need women who are technical, but cloud provides the chance to also champion ideas and work cross-functionally to define how IT is delivered to business.”

Lauren Savage, senior vice president for IT Strategy and Governance at State Street Corp., sees the cloud as an opportunity for women to “take the reins.” “Women are definitely becoming more attracted to IT because they see IT becoming a critical function to business performance,” Savage says.

The IT World and the Cloud Community is ready for even more contributions from these innovative women, and others like them.

By Peter Knight

Sorry, comments are closed for this post.

Comics
Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…