people source coming from threefold_Data
This commit is contained in:
Binary file not shown.
|
Before Width: | Height: | Size: 139 KiB After Width: | Height: | Size: 473 KiB |
@@ -1,21 +1,25 @@
|
||||
---
|
||||
title: "Al Morgan"
|
||||
description: "Seasoned tech marketer. Beginner’s mind coupled with life experience. Champion what matters."
|
||||
template: "person_page.html"
|
||||
extra:
|
||||
socialLinks: { LinkedIn: "https://www.linkedin.com/in/al-morgan-santacruz/"}
|
||||
organizations: ["foundation"]
|
||||
imgPath: al_morgan.png
|
||||
title: Al Morgan
|
||||
weight: 5
|
||||
description: Seasoned tech marketer. Beginner’s mind coupled with life experience. Champion what matters.
|
||||
taxonomies:
|
||||
people: ["al_morgan"]
|
||||
memberships:
|
||||
[ambassadors]
|
||||
people: [al_morgan]
|
||||
memberships: [ambassadors]
|
||||
categories: [foundation]
|
||||
extra:
|
||||
imgPath: al_morgan.png
|
||||
organizations: [porter_consulting, hpe, red_hat, cloud_brigade]
|
||||
countries: [USA]
|
||||
cities: [Santa Cruz]
|
||||
private: 0
|
||||
socialLinks: {
|
||||
LinkedIn: https://www.linkedin.com/in/al-morgan-santacruz/,
|
||||
websites: https://alliancemethods.com,
|
||||
}
|
||||
---
|
||||
|
||||
## Why ThreeFold?
|
||||
|
||||
Threefold helps people apply technology to achieve their goals while protecting their privacy. Distributing compute resource broadly reduces the risks that always accrue from concentration of data where it can become an attractive target for criminals or unethical government.
|
||||
|
||||
40 year infrastructure technology marketing veteran. Participated in the UNIX, database, client-server, WWW and mobility stack wars. My goal is to help people understand how technology can help them achieve goals. I want everything I touch to be simple concrete and true. I believe that humans can only flourish if they accept each other and seek out ways to increase understanding and collaboration.
|
||||
|
||||
<br>
|
||||
|
||||
### Why ThreeFold?
|
||||
|
||||
Threefold helps people apply technology to achieve their goals while protecting their privacy. Distributing compute resource broadly reduces the risks that always accrue from concentration of data where it can become an attractive target for criminals or unethical government.
|
||||
Reference in New Issue
Block a user