Open uri20171216 10 1oqtde4?format=auto&onerror=redirect&width=300

Juan C. Perez

Content Marketer

I'm currently a digital marketing manager, focusing primarily on content strategy and creation. I plan, write and edit a wide variety of content and product marketing assets, including blog post series, white papers, solution briefs, data sheets, case studies, thought leadership columns, corporate brochures, and website copy.

Prior to that, I was a journalist for 22 years, most of them covering the technology industry as a writer and editor. An award-winning technology reporter, I excelled at covering breaking news under extreme deadline pressure, getting scoops and crafting insightful news features. I also have more than 15 years of experience as desk editor, assigning and editing stories, coaching reporters and helping plan coverage.

Fully bilingual in Spanish-English, I report, write and edit in both languages, and do bi-directional translations. I have experience working with Latin America and the U.S. Hispanic market.

As a manager, I have successfully led high-stakes projects that require drafting long-term strategies, hiring/managing employees, allocating budgets, meeting goals and exceeding expectations.

Portfolio

Thought Leadership Pieces for Executives (Bylined and Ghostwritten)

Forbes
OracleVoice: Telcos Must Seize The 'Now Economy' Moment -- Now

The most popular and successful examples of the sharing economy-the likes of Uber, Airbnb, plus other "Now Economy"-fueled apps-can only exist thanks to a robust telecom infrastructure. Moreover, they're disrupting their respective industries-taxis and hotels-with a minimum of overhead and at breakneck speed.

E-Book / Solution Brief Samples

White Paper Samples

Blog Series Sample -- 1

Qualys Blog
10/05/2016
To Gauge Risk from Third Parties and Employees, Scalability and Automation Are Essential | Qualys...

We continue our series on assessing third-party risk, where we're describing scenarios in which an automated, cloud-based system can help you identify security and compliance gaps among vendors, partners and employees. As discussed in this series' first installment, it's short-sighted to put great effort into protecting your IT environment while ignoring the security and compliance policies and procedures of your trusted third parties.

Qualys Blog
10/12/2016
Lasso In Employee Training, Vendor Regulatory Compliance with Automated Risk Assessments | Qualys...

We continue our series on assessing third-party risk, where we're describing scenarios in which an automated, cloud-based system can help you identify security and compliance gaps among vendors, partners and employees. In addition to protecting their organization's IT environment, CISOs must also closely monitor the security and compliance policies and procedures of trusted third parties.

Qualys Blog
10/19/2016
Agility and Flexibility Needed To Manage Risk Throughout Vendor Relationship Lifecycle | Qualys Blog

We conclude our series on assessing third-party risk, where we've described scenarios in which an automated, cloud-based system can help you identify security and compliance gaps among vendors, partners and employees. As we have outlined in this blog series, CISOs and their infosec teams need clarity and visibility not only into their IT environments, but also across their roster of trusted vendors.

Blog Series Sample -- 2

Qualys Blog
09/12/2016
End the Nightmare of Vulnerability Disclosure Overload: Keep Calm and Prioritize | Qualys Blog

Overwhelmed by the mounds of vulnerabilities in their IT environments, many organizations struggle to prioritize remediation, but you can overcome this challenge with the right approach Steve, an information security manager, is again rattled awake at 3 a.m. by a recurring nightmare: He's at work and his desk suddenly gets transformed into a mile-long Whack-A-Mole cabinet with thousands of holes.

Qualys Blog
09/19/2016
Prioritizing Remediation: Plug into the Firehose of Vulnerability Disclosures and Correlate |...

This is part two in a three-part series on prioritizing vulnerability remediation, where we're explaining five basic requirements for identifying on an ongoing basis which IT assets you must patch right away. In our first post last week we met Steve, a nightmare-stricken infosec manager who loses sleep over his organization's inability to manage its IT environment's vulnerabilities.

Individual Blog Post Samples

Qualys Blog
08/07/2017
CyberSecurity Report: Threat Landscape Gets More Sophisticated | Qualys Blog

Destruction of service. Get acquainted with this newly-minted term, and with its acronym - DeOS. It's a particularly disturbing type of cyber attack InfoSec teams may face regularly in the not too distant future. That's one of the main findings featured in the Cisco 2017 Midyear Cybersecurity Report , a comprehensive cyber security study the networking giant has been publishing for almost a decade.

Qualys Blog
12/14/2017
Cloud Security Improves, But Much Work Still Remains to Be Done | Qualys Blog

As cloud computing adoption accelerates among businesses, InfoSec teams are struggling to fully protect cloud workloads due to a lack of visibility into these environments, and to hackers' increasingly effective attacks. That's the main finding from SANS Institute's "Cloud Security: Defense in Detail if Not in Depth" report , which surveyed IT and security pros from organizations of all sizes representing many industries.

Ibmbigdatahub
Big data simulation: Gaining insights on media life cycles from

Big data simulation and analytics has become an invaluable business tool for media and entertainment (M&E) companies as they seek to maximize the life cycles of movies and TV shows. The business model for TV shows and movies has changed dramatically in the age of digital entertainment and social media.

Case Study Samples

DXC Technology
Western National Insurance Improves Customer Interaction with Next-Gen Billing Solution

At Western National Insurance, the importance of billing its customers extends beyond processing and managing insurance premium payments. As the primary reason customers contact the company, billing isn't just a peripheral administrative function: it sits at the core of Western National's interactions with its customers across all of the Midwestern, Northwestern and Southwestern United States.

DXC Technology
Expediting and Advancing Patient Care at Cabrini

Cabrini Health's Brighton Hospital, an acute care facility that specializes in cancer services, women's health and surgery, recently boosted the speed, precision and quality of its clinical services by improving access to clinical and administrative patient information and introducing electronic medication management.

Corporate Brochures / Guides

Technology Journalism Samples

Techbeacon
Has DevOps turned development into a juggling act?

Here's a DevOps nightmare: It's been a few months since the DevOps adoption project was declared completed. The necessary automation tools are in place. Developers and IT operations staffers now belong to one team. They've been instructed to collaborate and communicate at every step of every applications' life cycle.

The Parallax
12/22/2015
The promise and peril of facial-recognition technology - The Parallax

In 2011, John H. Gass received a disconcerting message from the Massachusetts Registry of Motor Vehicles: His license had been revoked, and he had to refrain from driving immediately. Gass hadn't received a traffic ticket in years, The Boston Globe reported at the time .

TechBeacon
RSA Conference 2016: Application Security moves into the DevOps era

As information security stakes reach stratospheric levels due to massive, frequent and brazen attacks, many IT security managers are weighing whether DevOps can improve applications' protection against data thieves. Given this confluence, it's no surprise the topic has gained prominence in conferences like RSA, which last year added "DevOps" to the title of its long-standing Application Security track.

Computerworld
03/19/2014
Microsoft scrambles to simplify its licensing

Microsoft is pledging dramatic improvements to its notoriously complex enterprise licensing, but experts are skeptical about the potential impact of the plan. Microsoft's licensing policies and procedures are devilishly convoluted, a situation that has worsened in recent years with the popularity of virtualization, cloud computing, mobile devices and the consumerization of IT.

The Parallax
11/05/2015
Zuckerberg still hasn't found what he's looking for in Facebook search

Every time Mark Zuckerberg has tried to tackle search, he's landed on his back like Charlie Brown after Lucy pulls away the football. Facebook's co-founder and CEO has overseen successful work in areas such as user experience, mobile, display ads, high-performance computing, and multimedia management. But a smart-and conflict-free-search engine has eluded him.

PCWorld
Test and test again: the lesson from Windows 8.1's bumpy rollout

The rocky rollout of Windows 8.1 should serve as a reminder for consumers, software developers, hardware vendors, enterprise IT pros, and Microsoft itself that a period of careful testing and analysis must precede the release and installation of an operating system update. After it shipped on Oct.

PC World
Windows XP: Chronicle of a death foretold

When Microsoft ends support for Windows XP on Tuesday, a security sinkhole will likely open and gradually widen, threatening hundreds of millions of PCs worldwide in homes, companies, government agencies and schools. Along with the Y2K bug, Windows XP's support termination is one of the computer industry's most publicized-and most ignored -deadlines, toward which many business and IT managers have taken a curiously casual attitude.

PCWorld
Many employees won't mingle with enterprise social software

In a great IT industry irony, enterprise social networking (ESN) software, designed to boost interaction and collaboration, is often ignored by users and ends up forgotten like the proverbial ghost town with rolling tumbleweeds.

Computerworld
06/04/2013
'To-do' software makes comeback, welcomed by enterprise IT

Long considered old-school tools with no place in shiny corporate social collaboration suites, to-do software is making a comeback with a new air of cool about it and renewed appreciation from enterprise IT. The reason?

TechBeacon
Top 5 takeaways from RSA Conference 2016

To beat external hackers and disgruntled insiders, security vendors, their customers, and law enforcement must boost innovation, partnerships, and awareness about evolving threats. Now. That was a key message at the RSA Conference, whose 25th edition last week drew almost 40,000 attendees hungry to learn how to best protect their organizations from cybercriminals.

TechBeacon
RSA Conference 2016 preview: Top speakers, tracks and security trends

When the Moscone Center doors open on February 29, RSA Conference 2016 will kick off its 25 th annual edition, welcoming 30,000-plus attendees hungry for information security knowledge, as massive hacks against corporations and governments continue to occur with an increasingly disturbing frequency.

Ecommercebytes
Is Amazon Handmade Overreaching on Artisan Terms of Use?

Are artisans right to be concerned about terms of use they agree to when selling on marketplaces such as Amazon Handmade and Etsy? We dig into the issue and see what the legal experts say about the matter, and what they recommend online sellers do to protect themselves from overreaching agreements.

CIO
11/17/2014
Cisco crashes the enterprise mobile party with new collaboration app

Cisco will package and deliver enterprise collaboration capabilities via a mobile and Web app built to replicate the ease of use of consumer software but designed for ad hoc, workplace team interaction. The app, called Project Squared, joins a growing number of "consumerized" enterprise mobile and Web apps built by startups and designed to put a spin on collaboration, messaging, productivity, video conferencing and communications.

Techbeacon
DevOps Enterprise Summit preview: DOES15 arrives as DevOps buzz, controversies intensify

As the clock ticks down to the start of the DevOps Enterprise Summit 2015 (DOES15), burning questions, spirited debates, and intense market buzz swirl around this new approach to IT. Backers swear that DevOps can revolutionize a company's application development and delivery, but many potential adopters find DevOps confusing and hard to grasp.

Network World
09/28/2014
With new OS, Microsoft will try to put Windows 8 era behind it

After spending the past two years in damage control mode over Windows 8, Microsoft will officially begin a new era for its OS on Tuesday, when it's expected to unveil a preview of Windows' next major version during an event focused on enterprise customers.

CIO
09/22/2014
Delve, Office Graph Must Transcend Office 365 To Be Revolutionary

The release of Delve, the first application to use Microsoft's Office Graph machine learning engine, will be remembered years from now as either the genesis of a revolutionary technology or as a fireworks-style launch that dazzled everyone only for a brief moment.

PC World
Cloud message resonating with Microsoft partners

Microsoft has been screaming "cloud" in many partners' deaf ears for several years, but the company found a more receptive audience at this week's Worldwide Partner Conference. From CEO Satya Nadella on down, all Microsoft officials at the event told attendees that they need to switch their businesses to the cloud urgently, or else risk obsolescence and market defeat.

Techbeacon
DevOps at the IT core: How IT ops views modern software delivery

Picture a systems administrator in a traditional IT organization, with clearly delineated boundaries between their IT ops peers and the app developers. They've always viewed the "devs" as undisciplined, creative hippies who know nothing-and care little-about what it takes to keep production systems up and running.

CIO
12/05/2013
Why CIOs Stick with Cloud Computing Despite NSA Snooping Scandal

Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet. So far, they are monitoring the issue, getting informed and taking steps to mitigate their risk in various ways.

Facebook icon Twitter icon Linkedin icon Email icon