Sustaining Partners

Dell EMC Logo

Dell EMC

Through innovative products and services, Dell EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect, and analyze their most valuable asset, information, in a more agile, trusted and cost-efficient way. Dell EMC works to create opportunities for all employees to bring their ideas to the workplace in an environment that cultivates the exchange of broad thinking and inspires innovation. DellEMC funds NCWIT's efforts to increase representation of women of color in computing, such as TECHNOLOchicas and Finding Hidden Figures, a "Hidden Figures" campaign.

  • Jackie Glenn, Carolyn Muise
Motorola Solutions Foundation

Motorola Solutions Foundation

Motorola actively seeks diversity in the workplace by embracing different individuals, cultures, and abilities. Motorola is committed to developing an environment where individuals learn from one another's backgrounds. Motorola participates in the NCWIT Workforce Alliance, and its funding for NCWIT also supports local affiliates for the Award for Aspirations in Computing and Talking Points resources.

  • Lynn Zielke
Northrop Grumman

Northrop Grumman

Northrop Grumman engages in local education communities as partners in education. Through these outreach programs, the company provides financial and educational resources to help meet schools' education needs and inspire young people to become STEM professionals.

Palo Alto Networks

Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives, such as cloud and mobility. This kind of thinking and know-how helps customer organizations grow their business and empower employees all while maintaining complete visibility and the control needed to protect their critical control systems and most valued data assets.

  • Maya Marcus