Remove Demand Remove Fractional VPE Remove Security
article thumbnail

The Secret History of Minnesota Part 1: Engineering Research Associates

Steve Blank

The two groups would merge in 1949 as the Armed Forces Security Agency and then become the National Security Agency (NSA) in 1952. Norris became the VP of Engineering, Engstrom the VP of Research, and Meader VP of Manufacturing. What Did ERA Build For the National Security Agency (NSA)?

Minnesota 317
article thumbnail

What is a CTO?

Austin Startup

They will provide strategic technical guidance and direction with attention to scalability, security, quality, maintainability, and reliability. They will review and negotiate all related contracts. Security needs to be top of mind for any CTO.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Startup Advice: When to Use a Consulting CTO

rapidrollout.wordpress.com

Web Startup Lessons Advice from a CTO and Entrepreneur Home About Startup Advice: When to Use a Consulting CTO There are not many to be found. He or she might call himself a “consulting CTO,&# “freelance CTO,&# “on-demand CTO,&# “CTO on call,&# “CTO for hire,&# or just a “technology strategy advisor.&#

article thumbnail

Reincubate: Blog: Chief Technology Officer job description (for web, start-up or corporate)

www.reincubate.com

Share this: chief technical officer chief technology officer cto interim cto job description start-up startup cto web cto Weve been swapping some thoughts with Daniel Kehoe , a consulting CTO acquaintance of ours from across the pond. Where appropriate, patent or secure intellectual property by other means.

CTO 40
article thumbnail

CEO Friday: Why we don’t hire.NET programmers

blog.expensify.com

Do a curl (or your.NET equivalent) on each domain, and see how many are running a Windows server: I think you’ll find the fraction very small. I currently work in information security, and I help teach developers how to write better, more secure code. Nothing says contraction negotiation like the smell of cordite.

Java 107