Remove Authentication Remove Books Remove CTO Remove Network
article thumbnail

How the invasion of Kuwait helped shape the leadership style of Uplevel CTO Ravs Kaur

GeekWire

Ravs Kaur, chief technology officer and co-founder of Uplevel. Her father’s actions during the harrowing experience showed Kaur facets of leadership from which she has drawn throughout her career, including her current role as chief technology officer for Uplevel , a Seattle tech startup.

CTO 118
article thumbnail

Hadoop Security: New book by Ben Spivey and Joey Echeverria Is Exactly What The Community Needs

CTOvision

We hold Ben Spivey and Joey Echeverria in the highest regard, and are very pleased to give this book our highest possible endorsement. The post Hadoop Security: New book by Ben Spivey and Joey Echeverria Is Exactly What The Community Needs appeared first on CTOvision.com. Title: Hadoop Security. Order here. Amazon.com.

Security 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Authentic Digital Relationships

Phil Windley

I was the founder and CTO of iMall, an early, pioneering ecommerce tools vendor. An identity metasystem based on protocol will have network effects that drive interoperability leading to universality. Supporting Authentic Relationships. Administrative Identity Systems Create Anemic Relationships.

article thumbnail

Storytelling for CIOs: From niche to bestseller

CIO Business Intelligence

I take what I learned in the scriptwriting seminar about passion and the narrative arc into every meeting I attend,” one chief technology officer said. Miguel Traquina, CIO of biometric authentication company iProov, agrees. Going beyond that, some said they attended sessions on fiction, poetry and scriptwriting. “I

article thumbnail

Anti-Asian hate is spilling over to LinkedIn

The Verge

The message might have drawn racist comments on Twitter or Facebook, but this was the world’s biggest professional social network — one where people had to use their real names and list their employer. What was the worst they would say? I would not be surprised if AAPI isn’t [Chinese Communist Party] backed.”

CTO 103
article thumbnail

National Cyber Security Hall of Fame Announces 2015 Inductees

CTOvision

patents with two pending applications in the field of computer and network security, and is co-author of the book, The Security Development Lifecycle. Lipner is named as an inventor on 12 U.S. Susan Landau is a Professor of Cybersecurity Policy in the Department of Social Science and Policy Studies at Worcester Polytechnic Institute.

Security 150
article thumbnail

Bringing the Magic of Amazon AI and Alexa to Apps on AWS.

All Things Distributed

Today, there are thousands of machine learning scientists and developers applying machine learning in various places, from recommendations to fraud detection, from inventory levels to book classification to abusive review detection. in ML and neural networks) and access to vast amounts of data.