Lead Engineer & Product Owner for our Policy-as-Code framework, SDLC, & implementation. Running the cloud security training program, and developing cloud-native security guardrails for a safe landing in the public cloud.
End-to-end ownership of Container Security in CI/CD pipelines & runtime (Docker, Kubernetes, OpenShift), WAF/Bot Management, AppSec, and Vulnerability Management.
Transforming VDI provisioning experience and delivering on flexile workplace initiatives to enable a nomadic workforce.
Leading committees & board oversight, policy development, objectives, strategy development and enforcement. Grew to being a $1M+/yr organization.
Steering & oversight for a $500k+ p.a. budget nonprofit providing emergency shelter & services to homeless LGBTQ youth in Texas.
Led the global LGBTQIA+ employee resource group, supporting branding/marketing/HR objectives to increase diversity & inclusion.
Each titled Systems and methods for locally streaming applications in a computing system - 10,089,209 - 10,248,531 - 10,452,512 - 10,824,534. Want to eliminate the cruft that builds up over time in your computer? Want to eliminate breaking changes when you get new software/updates installed? That’s what this solves.
10,872,032 - Systems and methods for software development using sandbox views. Want to offer non-perstent user environments and be able to do development offloaded to the local machine? This enables that. Inspired by the challenges of non-persistent VDI, user profile virtualization, and needing a solution to enable development teams to use that architecture.
10,869,409. Take advantage of a vortex to accelerate heat removal in racks and lower your spend on air handling.
10,893,634. Your datacenter equipment doesn’t have the same requirements - why do we cool it as if it did? Use this to solve that, saving your cooling spend and keeping equipment in more stable environments.
10,986,226. Prove that the customer service rep is truly with the company they say and fight fraud – this system would let a company send a push to users' devices when they need to reach the customer so that you know it’s really them.