Feeds

Cisco sets Warrior on unit left empty by new Skype CEO

CTO juggles enterprise, commercial, small biz hats

Reducing the cost and complexity of web vulnerability management

Cisco’s CTO Padmasree Warrior had her brief widened yesterday at the IT network firm, after she took on the job left vacant by Skype’s shiny new CEO, Tony Bates.

Warrior, who joined Cisco in 2007, is now also responsible for the company’s enterprise, commercial and small biz unit.

“This is the heart of Cisco’s business and we are fortunate to have the talent of an (ahem) warrior take over this industry leading team of over 10,000 world-class engineering talent,” said the firm’s John Earnhardt in a blog post.

She previously worked at Motorola where she was responsible for $4.1bn research and development investments and about 26,000 engineers.

Warrior, who reports directly to Cisco boss John Chambers, was described by Earnhardt as a “technology visionary in areas such as cloud computing, mobility, the future of internet technology and more.”

So, if the hat fits… ®

Choosing a cloud hosting partner with confidence

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.