Heroes Of The Cloud – Part 8

Heroes Of The Cloud – Part 8

Heroes Of The Cloud – Part 8

Cloud - Padmasree Warior

As we study the innovators who have helped make cloud computing a reality, it becomes apparent that significant and lasting success in the Cloud field depends as much on entrepreneurial vision as it does technical savvy.

Harnessing the technology to get a group of servers, or even server farms to cooperate in a fashion that is capable of handling truly Big Data is a marvel. In the long run, it is probably not half as important as finding a way for the technology to not only generate a profit, but to generate profit for the end users of the technology. In many ways, this has bee as much about proselytizing as it has been about coding and computing.

Two of the strongest voices singing the praises of Cloud Computing for business have been Padmasree Warrior, Chief Technology and Strategy Officer at Cisco, and Lauren States, Vice President and CTO of Cloud Computing at IBM.

Warrior took her bachelors degree in Chemical Engineering from the Indian Institute of Technology in New Dehli, and holds a masters in Chemical Engineering from Cornell. In 1984 she joined Motorola as one of the few women working at their Arizona facility. In 23 years with the company she held a number positions, including Corporate Vice President and General Manager of Motorola’s Energy Systems Group, and Corporate Vice President and Chief Technology Officer in its Semiconductor Products Sector. Her promotion to CTO in 2003 also brought a senior vice presidency, and in 2005 she was promoted to executive vice president.

While she was CTO at Motorola, the company was awarded the 2004 National Medal of Technology by the President of the United States, the first time the company was so honored. Since joining Cisco in 2007, Warrior has been tasked with aligning corporate strategy and technology development to allow Cisco to anticipate, shape, and lead market transitions. As a senior vice president she led Cisco’s world wide engineering organization and has been responsible for core switching, collaboration, cloud computing and data center/virtualization, and architectures for business transformation.

Lauren States has had a wealth of experience with IBM, beginning as a Systems Engineer in New York City and moving on to roles in sales and marketing. She brings a combined perspective of business and technical expertise to the Cloud discussion.

As vice president of Cloud computing for the IBM Software Group States led the global team responsible for establishing Market Leadership in Cloud Computing. As CTO for the Cloud Computing and Growth Initiatives on IBM’s Corporate Strategy Team, States is responsible for the Technology strategy for the company’s growth in Cloud Computing, business analytics, and emerging markets.

States has written and talked extensively on the growing importance and possibilities of Cloud Strategies.

By Peter Knight

Sorry, comments are closed for this post.

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…