This document is a resume for Jeff Ballard, an experienced IT executive. It summarizes his professional experience overseeing teams of up to 45 IT professionals and managing an annual capital budget of over $4 million. His experience includes roles as global head of IT services, IT liaison to other departments, and representative for corporate IT projects. He has over 12 years of experience in IT leadership roles at major companies like Sony Pictures Entertainment.
Poly Only Cleared Job Fair Job Seeker Handbook November 18, 2015, Dulles, VaClearedJobs.Net
If you have an active CI or FS polygraph please join us Wednesday (register at http://clearedjobs.net/job-fair/fair/30/) at the Hyatt Dulles to meet with employers, network with other cleared professionals and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and the positions they will be seeking to fill at the Cleared Job Fair.
Poly Only Cleared Job Fair Job Seeker Handbook November 18, 2015, Dulles, VaClearedJobs.Net
If you have an active CI or FS polygraph please join us Wednesday (register at http://clearedjobs.net/job-fair/fair/30/) at the Hyatt Dulles to meet with employers, network with other cleared professionals and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and the positions they will be seeking to fill at the Cleared Job Fair.
A look at IT decision making, budgeting, priorities and technology adoption among UK and Germany-based SMEs based on 500 interviews (250 in the UK and 250 in Germany) with IT decision makers from private sector SME organisations.
Seven Guiding Principles for Developer EngagementBarton George
This presentation walks you through a set of seven principles to attract and engage developers. These principles ultimately provide the foundation for a broader developer strategy. The deck concludes with four tips to bootstrap your program via a guerilla-style approach.
Operations to enable to better the business they serve and have moved beyond traditional cost reduction to embrace new technology, practices and talent to move beyond incremental gains. See Gianni Giacomelli, SVP, Genpact and Phil Fersht, CEO, Hfs Research explain how to do this.
Melony Myers, IT CV, Resume, & TestimonialsMelony Myers
A results-orientated Information Technology leader, adept at applying innovative solutions to meet IT operations and infrastructure needs of diverse industries.
The RFID End-User in 2011: Why 2011 Will be Another Big Year for RFIDVDC Research Group
During this webcast, Drew Nathanson, Director of Research Operations at VDC Research, discusses how the RFID end-user community has changed in recent years, how the perception of the technology has shifted and why that will translate into an expected 64% increase in RFID budgets for 2011.
"Transforming Government Through Business and Information Technology (IT)/Information Resource Management (IRM)," a presentation by Sanjeev “Sonny” Bhagowalia, Chief Information Officer of the State of Hawaii at the launch of the "Make IT Happen Hawaii Coalition."
Elisa Koch, LinkedIn’s Insights Lead for AUNZ, shared the key insights and learnings from LinkedIn’s Tech research “Taking a Deeper Look at Today’s Empowered Tech Buying Process”.
Do Chimpanzees Learn Reputation by Observation? Evidence from Direct and Ind...Francys Subiaul
Can chimpanzees learn the reputation of strangers indirectly by observation? Or are such stable behavioral attributions made exclusively by first-person interactions? To address this question, we let seven chimpanzees observe unfamiliar humans either consistently give (generous donor) or refuse to give (selfish donor) food to a familiar human recipient (Exps. 1 and 2) and a conspecific (Exp 3). While chimpanzees did not initially prefer to beg for food from the generous donor (Exp 1), after continued opportunities to observe the same behavioral exchanges, four chimpanzees developed a preference for gesturing to the generous donor (Exp 2), and transferred this preference to novel unfamiliar donor pairs, significantly preferring to beg from the novel generous donors on the first opportunity to do so. In Experiment Three, four chimpanzees observed novel selfish and generous acts directed toward other chimpanzees by human experimenters. During the first half of testing, three chimpanzees exhibited a preference for the novel generous donor on the first trial. These results demonstrate that chimpanzees can infer the reputation of strangers by eavesdropping on third-party interactions.
A look at IT decision making, budgeting, priorities and technology adoption among UK and Germany-based SMEs based on 500 interviews (250 in the UK and 250 in Germany) with IT decision makers from private sector SME organisations.
Seven Guiding Principles for Developer EngagementBarton George
This presentation walks you through a set of seven principles to attract and engage developers. These principles ultimately provide the foundation for a broader developer strategy. The deck concludes with four tips to bootstrap your program via a guerilla-style approach.
Operations to enable to better the business they serve and have moved beyond traditional cost reduction to embrace new technology, practices and talent to move beyond incremental gains. See Gianni Giacomelli, SVP, Genpact and Phil Fersht, CEO, Hfs Research explain how to do this.
Melony Myers, IT CV, Resume, & TestimonialsMelony Myers
A results-orientated Information Technology leader, adept at applying innovative solutions to meet IT operations and infrastructure needs of diverse industries.
The RFID End-User in 2011: Why 2011 Will be Another Big Year for RFIDVDC Research Group
During this webcast, Drew Nathanson, Director of Research Operations at VDC Research, discusses how the RFID end-user community has changed in recent years, how the perception of the technology has shifted and why that will translate into an expected 64% increase in RFID budgets for 2011.
"Transforming Government Through Business and Information Technology (IT)/Information Resource Management (IRM)," a presentation by Sanjeev “Sonny” Bhagowalia, Chief Information Officer of the State of Hawaii at the launch of the "Make IT Happen Hawaii Coalition."
Elisa Koch, LinkedIn’s Insights Lead for AUNZ, shared the key insights and learnings from LinkedIn’s Tech research “Taking a Deeper Look at Today’s Empowered Tech Buying Process”.
Do Chimpanzees Learn Reputation by Observation? Evidence from Direct and Ind...Francys Subiaul
Can chimpanzees learn the reputation of strangers indirectly by observation? Or are such stable behavioral attributions made exclusively by first-person interactions? To address this question, we let seven chimpanzees observe unfamiliar humans either consistently give (generous donor) or refuse to give (selfish donor) food to a familiar human recipient (Exps. 1 and 2) and a conspecific (Exp 3). While chimpanzees did not initially prefer to beg for food from the generous donor (Exp 1), after continued opportunities to observe the same behavioral exchanges, four chimpanzees developed a preference for gesturing to the generous donor (Exp 2), and transferred this preference to novel unfamiliar donor pairs, significantly preferring to beg from the novel generous donors on the first opportunity to do so. In Experiment Three, four chimpanzees observed novel selfish and generous acts directed toward other chimpanzees by human experimenters. During the first half of testing, three chimpanzees exhibited a preference for the novel generous donor on the first trial. These results demonstrate that chimpanzees can infer the reputation of strangers by eavesdropping on third-party interactions.
Enterprise 2.0 bei der Deutschen Telekom
Soziale und kulturelle Herausforderungen bei der Etablierung von Wikis und SNS als Instrumente eines modernen Wissensmanagements
Présentation du fonctionnement des places de marché, des avantages et des inconvénients à promouvoir ses produits via ces plateformes, et conseils pour bien choisir sa place de marché.
Senior information technology leader accomplished in using technology in support of business operations. Expertise in delivering a competitive advantage to business by utilizing a strategic business plan and complementary technology roadmap. Utilize technology, people, process, and leadership skill to support business and impact bottom line. Diverse field of technology work experience with Fortune 500 Company, entrepreneurial business, and trade association.
Preston Williams III is Senior Partner & Chief Information Officer (CIO) at GBC® Global Services. He is a pioneer and futurist with 20+ years of Big 4, Fortune 500, Global 100 and entrepreneurial experience. That experience includes Senior Auditor with Price Waterhouse (PriceWaterhouseCoopers), Controller for Lynn-Phill, IT Consultant with McGladrey & Pullen and Andersen Consulting (Accenture) as well as Project Executive at IBM® Global Services. He also worked as the first Product Manager for Global Data Collection with Dun & Bradstreet (D&B) and the first Chief Information Officer (CIO) at Langston University.
From 2002 to 2004, Preston served as the first Chief Executive Officer (CEO) & Managing Partner at GBC®. Incorporated in Delaware, USA; the firm operates in Kenya, Liberia, Uganda and the United States. He has successfully implemented sound, reliable, dynamic and robust IT systems integration and financial management solutions in North America, Asia Pacific (APAC), Latin America (LATAM), Europe, the Middle East and Africa (EMEA).
Mr. Williams is Chairman of the GBC® Board of Directors, a recipient of the IBM® Global Services Leadership Award, a member of the Global CIO Think Tank and a member of the Internet Evolution Executive Clan.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Jeff ballard resume_april_2016
1. Jeff Ballard
Huntington Beach, CA
JeffBallard711@gmail.com
310-871-2951 (cell)
www.LinkedIn.com/in/JeffBallard711
SUMMARY
A highly experienced information technology executive overseeing teams of up to 45
professionals comprised of entry-level analysts to global department Directors focused on the
delivery of technology driven IT services, and the provisioning of IT and Mobility equipment with
an annual capital budget responsibility of over US $4 Million.
Broadly engaged as the global head of IT services and technology; as the IT liaison to Labor
Relations, Human Resources,Legal and Procurement;as global IT audit and risk and compliance
control owner; intercompany representative to key divisions of a major electronics company and
delegate for corporate-wide IT projects, sourcing arrangements and consolidation efforts of up to
US $90M a year in scope.
ITIL V3 Foundation certified Exceptional communications skills
Pioneer of technology solutions
Strong customer service focus
Deep technical expertise
Staff mentoring and professional growth
IT services for high profile executives and
industry events
.
PROFESSIONAL EXPERIENCE
Re8 Professional Services, Costa Mesa, CA 2016 – 2016
Red8 focuses professional services for IT infrastructure with a specialty in Data Center services.
Sr. Infrastructure Consultant, 2016- 2016
Project Owner, managing a team of service companies and customer IT professions engineering
and supporting the relocation, restructuring and consolation of a 600-piece primary data center
for a national title and mortgage company into a 2000 sq/ft cage within a data center colocation
facility located in Houston Texas. Implementing all new data center core network routing,
switching and distribution hardware, all new rack layouts, structuredcabling, 17 new MPLS, point-
to-point, NLAN and ASE data circuits through four different national data carriers and all pre move
facilities prep activities and move day logistics with armed security escort.
Colorado Access, Denver, CO 2015 – 2015
Colorado Access, a leading Colorado non-profit healthcare company, serves as the health
insurance carrier for over 1 million members throughout Colorado
Consultant, 2015- 2015
Technical design of network, security, telephony, sound masking, MPLS redundancy and cabling
infrastructure installation for a new multistory building and separate shared tenancy office space.
Supplemental areas of focus include maturity assessment and gap analysis for various IT policy,
process and procedures; assisting with implementation of a ITIL, HIPPA and HITECH compliant
IT service provisioning and robust security framework; WAN optimization, data lost prevention;
Advanced Persistent Threat analysis: IT Asset Management; Risk and Compliance activities; IT
publicity within the general user and executive population and driving IT success through
implementation of a Continuous Quality Improvement program and a secure, EPA compliant
2. Jeff Ballard Page 2
lifecycle management process for all technology and devices.
SDI Media, Culver City, CA 2014 – 2014
SDI Media is the largest language localization (media translation) provider in the world, servicing
over 40 markets in 37 countries across the globe.
Consultant, 2014- 2014
Lent expertise to the SDI Media CIO on high-level technology planning and problem solving with
a focus on the growth and mentoring of senior IT leadership. Identified specific cross-training
opportunities for extended utilization of limited resources and to insulate the potential business
impact at the loss of key IT personnel.
ShowMgr.com, Rancho Santa Margarita, CA 2014 - 2014
ShowMgr.com is the leading cloud-based ERP software provider for media and content creators,
allowing for the seamless managementof resources,film and television crews and media creation
accounting, scheduling and budgeting.
Vice President, IT Operations, 2014- 2014
Responsible for IT security, standards, policies and procedures; risk and compliance and the
architectural evolution and maturity of ShowMgr's technical IT services.
Recommended the consolidation of webhead, SQL and transactional servers into fewer but
more robust hosting platforms saving over $18k/mo in expense with increased
responsiveness and reliability for the ShowMgr solution.
Conducted security baseline and gap analysis, recommending changes to a wide range of
internal processes resulting in a significantly reduced threat footprint.
Drafted plans for business continuity, disaster recovery and emergency notification
processes, and various internal company policies related to acceptable use, network access,
two-factor authentication and development code release processes, greatly enhancing
internal process maturity.
Sony Pictures Entertainment, Culver City, CA 2002 - 2014
A US-based, $30B division of Sony Corporation, Sony Pictures is one of the largest and most
successfulmoviestudios in Hollywood and the single largest international TV station owner in the
world.
Executive Director, Global Head, IT Support Services
Lead a group of 45 technicians and 27 offshore analysts and managed 4 Directors and 2
Managers compromising the Global IT Help Desk, US and UK Desktop Support, IT Asset
Management, Mobile Technology and Advanced Client Technology groups.
Lead the on-site technical support team providing IT, mobility, multimedia and talent technical
setup and support to the Summer of Sony (2011, 2012, 1013), the largest private film junket
in the world, hosting press conferences, talent interviews and pre-release screenings to over
300 of the world’s most influential news media guests, in Cancun, Mexico.
Saved over $40,000 in satellite truck expense per event by working with Publicity and
International Marketing to create the studio’s first internet-based interactive media service
allowing remote talent real-time interaction with intimate to large format multi-camera media
and press Q&A sessions throughout North America, Latin America, Asia Pacific, the UK and
Europe.
Improved budgetary compliance through management of (10) capital pools representing US
3. Jeff Ballard Page 3
$3M- $4M, resulting in annual variance reduction from 12-15% to less than 0.3 % over 8
straight years, despite mid-year reductions exceeding 30% of total.
Established a global desktop engineering taskforce addressing the Windows XP remediation
through a (3) year plan of strategic asset deployment and repurposing resulting in over 98%
of Sony Pictures 8,000 desktop assets converted to Windows 7 by April 1, 2014.
Lead the Desktop Support group to Winner, Best Service Excellence award for Sony Pictures
IT, 2012 and 2013.
Oversaw the partial outsourcing of (11) help desk analysts by establishing level 1 and new
level 1.5 IT services with Tata Consulting Services (TCS), Chennai, India, saving Sony
Pictures over US $1M annually while introducing self-service options for password reset,
instant message chat and FAQ documents into the first-ever 24x7x365 live, multilingual IT
help desk for Sony Pictures.
Reduced IT capital expenses by working with Sony’s Imageworks, Animation, PlayStation and
Electronics groups to consolidate IT purchasing and the renegotiation of newly combined
desktop and software maintenance contracts.
EDUCATION / TRAINING
B.S. Information Technology, Information Systems
University of Redlands, Redlands, CA
Pink Elephant and Loyalist Certification Services, Culver City, CA
ITIL V3 Certification # 86819
CIO Pathways Leadership Program
Focus on IT Strategy, Change Leadership and People Development