Skip to main content

Hello, I’m Heather – a technical storyteller from San Diego focusing on emerging technologies and other complex topics.

Want to get in touch? Let's talk

Introduction to SASE

Introduction to SASE

Query Execution Model

Query Execution Model

Understanding Continuous Threat Exposure Management (CTEM)

Understanding Continuous Threat Exposure Management (CTEM)

Managing AI Security Risks

Managing AI Security Risks

AI Roles in Attacks and Cybersecurity

AI Roles in Attacks and Cybersecurity

Optimizing Security with Network Detection and Response (NDR)

Optimizing Security with Network Detection and Response (NDR)

The Hacking Lifecycle and Data Recovery

The Hacking Lifecycle and Data Recovery

Distributed SQL Analytics with Presto

Distributed SQL Analytics with Presto

Apache NiFi and the ETL Pipeline

Apache NiFi and the ETL Pipeline

Delta Lake Essentials

Delta Lake Essentials

3 Vs of Data in a Hybrid Cloud World

3 Vs of Data in a Hybrid Cloud World

Spark on Kubernetes

Spark on Kubernetes

Running Spark on Kubernetes

Running Spark on Kubernetes

What are the 3 Vs?

What are the 3 Vs?

From Data Center to Hybrid Cloud

From Data Center to Hybrid Cloud

ETL Process in 9 Steps

ETL Process in 9 Steps