Welcome!


News Desk

Leysin American School is an exclusive, private boarding school located in Leysin, Switzerland. Leysin selected an OpenStack-powered, private cloud as a service to manage multiple applications and provide development environments for students across the institution. Seeking to meet ri...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, t...
SYS-CON Events announced today that IDenticard will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. IDenticard™ is the security division of Brady Corp (NYSE: BRC), a $1.5 billion manufacturer of ...
Eighty-nine percent of knowledge workers retain access to the sensitive corporate applications and files of former employers. Earlier this year, a member of the team at Site-Eye, one of the top time-lapse film companies in the UK, noticed a disturbing problem with one of its client'...
The Internet of Things needs an entirely new security model, or does it? Can we save some old and tested controls for the latest emerging and different technology environments? In his session at Internet of @ThingsExpo, Davi Ottenheimer, EMC Senior Director of Trust, will review hands-...
Connected devices are changing the way we go about our everyday life, from wearables to driverless cars, to smart grids and entire industries revolutionizing business opportunities through smart objects, capable of two-way communication. But what happens when objects are given an IP...
SYS-CON Events announced today that IDenticard will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. IDenticard™ is the security division of Brady Corp (NYSE: BRC), a $1.5 billion manufacturer of ...
DevOps, Cloud and Your SDLC Cloud computing started a technology revolution; now DevOps is driving that revolution forward. By enabling new approaches to service delivery, cloud and DevOps together are delivering even greater speed, agility, and efficiency. No wonder leading innovat...
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft, to discuss how developers are extremely well-poised to perform tasks critical for securin...
Multi-Cloud Bootcamp, being held Nov 4-5, 2014, in conjunction with 15th Cloud Expo in Santa Clara, CA, delivers a real-world demonstration of how to deploy and configure a scalable and available web application on all three platforms. The Cloud 360 Bootcamp, led by Janakiram MSV, an a...
Come learn about what you need to consider when moving your data to the cloud. In her session at 15th Cloud Expo, Skyla Loomis, a Program Director of Cloudant Development at Cloudant, will discuss the security, performance, and operational implications of keeping your data on premise, ...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in – unannounced and unnoticed. By the time these thieves get in, t...
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. Enterprises must protect their data from (i) system administrators who don’t need to see the data in the clear and (ii...
With the capability to reduce both CapEx and OpEx, it’s easy to see why the SDN-NFV trend has taken hold in the hosting and mobile industry. Early use cases include network virtualization from cloud service providers and enterprise data centers, bandwidth calendaring and network tappin...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands...
Pegasystems Inc. (NASDAQ: PEGA), the software company powering the digital enterprise, today announced it will host its second annual Pega Developers Conference (PDC) at the Hyderabad International Convention Centre October 12 - 13, 2014. The two day conference is designed to respond t...
What process has your provider undertaken to ensure that the cloud tenant will receive predictable performance and service? What was involved in the planning? Who owns and operates the data center? What technology is being used? How is it being supported? In his session at 14th Cloud E...
Fujitsu has a long and demonstrated history delivering world-class solutions that enable businesses to succeed in a highly competitive market and ever-evolving technology landscape. The Fujitsu Cloud ISV Partner Program is one more way we’re delivering exceptional value to our customer...
Come learn about what you need to consider when moving your data to the cloud. In her session at 15th Cloud Expo, Skyla Loomis, a Program Director of Cloudant Development at Cloudant, will discuss the security, performance, and operational implications of keeping your data on premise, ...
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft, to discuss how developers are extremely well-poised to perform tasks critical for securin...
TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused. Hear what others are saying about this valuable survey rep...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensi...
Security is critical to Internet of Things (IoT) adoption because we want to make sure we can trust the sensors, actuators, rules engines and other connected componentry we embed in every element of our existence. Bringing this down to earth is as easy as pointing out that people's sma...
The promise of easy, rapid, and low-cost deployment is luring increasing numbers to the cloud. Is security the only remaining obstacle to total domination by the cloud? In his session at 14th Cloud Expo, John Gunn, VP of Corporate Communications for VASCO Data Security, will examine ho...
This Lab Validation report from Enterprise Strategy Group (ESG) provides you with best practices to create an environment that offers you simple unified data protection across physical and virtual landscapes, maximum protection and data availability, and reduced storage needs and opera...
Electric Cloud's Juan Jimenez recently blogged: "Consider this statement of truth – the bane of any Continuous Delivery strategy is testing. You can have wildly fast builds...completely automated Continuous Integration and Delivery... but if your Continuous Testing slows your Agile-ity...
Against the backdrop of a new survey demonstrating significant cost savings that can be attained by Federal Government adoption of cloud computing, AT&T* on Tuesday announced a highly secure cloud-based storage solution designed specifically to meet the robust security requirements of ...
IDenticard Access Control is a leading manufacturer of integrated access control solutions to protect employees, visitors, and facilities. Owned by Brady Corporation (NYSE:BRC), a $1.15 billion manufacturer of identification products, IDenticard Access Control draws on its 30 years of ...
Today's datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIOs conquering these types of challenges? Find...
SYS-CON Events, Inc. named Cisco "Gold Sponsor" of upcoming Cloud Expo, co-located with 3rd International Internet of @ThingsExpo, the largest IoT event in the world. 15th International Cloud Expo will take place November 4-6, 2014 at the Santa Clara Convention Center in Santa Clara, C...
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting eve...
Recent high profile security breaches at major online websites tell us static passwords are not the answer. Even recent SMS security additions to consumer websites do little to address the issue. Fortunately, a more secure authentication system is available for consumer websites that ...
IBM on Monday announced it has acquired the business operations of Lighthouse Security Group, LLC, a premier cloud computing security services provider. Lighthouse Security Group's Gateway platform protects identity and data in an increasingly complex IT environment where more company ...
Explosive technological advancement has created a molten landscape of disruption, reinvention and creation. New services arrive and become versatile building blocks for new ideas, products and businesses. As intuitive and intelligent technology relieves us of administrative burdens, we...
Evelyn de Souza is a cloud compliance and data privacy strategy leader at Cisco responsible for championing solutions to address emerging industry trends. She is a strong proponent of building repeatable processes that enable organizations to sustain compliance while optimizing data se...
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft, to discuss how developers are extremely well-poised to perform tasks critical for securin...
Lantronix, Inc. (NASDAQ: LTRX), a leading global provider of smart IoT (Internet of Things) solutions, announced the worldwide availability of its new PremierWave® SE1000 -- a high performance, programmable, Ethernet-based System-on-Module (SOM) that enables hardware and software engin...
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, ...
This independent report from Info-Tech evaluates and scores 14 companies in the Virtual Machine Backup market. It can help you understand what's new in the virtual backup market, evaluate virtual backup vendors and products for your needs and determine which products are most appropria...