Welcome!

Cloud Security Authors: Liz McMillan, Scott Millis, Elizabeth White, Kevin Jackson, Doron Kolton

Related Topics: Containers Expo Blog

Containers Expo Blog: Article

SYS-CON's 5th International Virtualization Conference & Expo: Themes & Topics

A round-up of the Virtualization themes & topics being discussed March 30 - April 1, 2009, in New York

From Automation to Virtual Security, a round-up of the Virtualization themes & topics being discussed March 30-April 1, 2009, in New York City by the world-class speaker faculty at the 5th International Virtualization Conference & Expo being held in The Roosevelt Hotel, in midtown Manhattan.

Beyond Datacenter Virtualization - How can the benefits of virtualization now be applied to transform branch and remote office efficiency and productivity? Where do new opportunities lie for realizing a truly dynamic enterprise? Certeon's Co-Founder & Director of Research, Shawn Cooney, will be giving a session in NYC in which he will argue that it is time for virtualization to take its impact beyond the datacenter.

Business Change Through Virtualization - Virtualization transforms a hardware purchase into a time-boxed resource rental for the customers of IT. How else can we leverage this technology change to drive business change in our IT organizations? Fortisphere Co-Founder & CTO John Suit will in his New York session discuss the types of management platforms that will drive eager adoption of virtualization and IT services across the organization.

Client-Hosted Virtualization - Gartner reports that the five-year TCO of corporate PCs is approximately 10 times the purchase price, a significant IT expenditure. Clearly this can be reduced, but doing so requires rethinking how desktops and laptops are managed and supported. In his session in NYC Neocleus VP Bill Corrigan will overview how client-hosted virtualization offers a different approach to controlling the corporate image without compromising security, ultimately reducing TCO of corporate-owned desktops and laptops.

Compliance - The key to virtualization success, contends Embotics CEO Jay Litkey, is the ability to maintain compliance. Everything known about ensuring physical server compliance, such as configuration, access control and security is still relevant and needs to be adjusted to fit in the virtual server space. Litkey will be giving a session in New York looking at compliance control when copying, moving and consolidating servers and data centers.

Desktop Virtualization - Desktop virtualization is moving forward apace and keeping up is a major task. Martin Ingram, VP of Strategy at AppSense, is giving a session in New York looking at the virtualization technologies (hardware, operating system, application and user) and where they can be used (hosted, client and cloud). The session will equip you to evaluate all the technologies, their relevance for your users and the benefits you should expect.

Endpoint Virtualization - The separation of user data from applications can give IT greater control over protecting information assets. In a session devoted to "Leveraging Endpoint Virtualization," Symantec's Sr. VP of Strategy Ken Berryman will be discussing in NYC how on-demand streaming of applications in virtual layers can provide additional benefits by eliminating conflicts between applications.

Flexible I/O - see Self-Virtualizing Devices

Future of the Virtual Enterprise - In a session in New York exploring the advancements in database virtualization techniques that make data in the clouds a viable reality, Xeround VP John Trembley will discuss how most architectures employ a classic hot-standby with replication model which is both woefully inadequate.

Legal Pitfalls of Virtualization - Little thought goes into the legal implications of moving to a virtualized environment. So in his informative session, Attorney at Law David Snead will cover upstream, downstream and corporate liability issues associated with acquiring, using and distributing virtualized and cloud computing products. A similar session was a huge success on the West Coast, at the 4th International Virtualization Conference & Expo. Now Snead bring it to NYC.

Performance & Capacity Management - The dynamic nature of virtualized systems introduces issues that were not present in the physical world. Furthermore the virtualization process breaks many of the resource based methods that performance management was done in the past. Bernd Harzog from APM Experts will be giving a session in New York in which delegates will find out what the criteria are for how to evaluate virtualization performance management products, and how those criteria are applied to popular products on the market today.

Security - Virtualization breeds new security challenges, attack surfaces, and a swath of availability implications. In his session in NYC, IBM virtualization security expert Joshua Corman will examine these new threats and outline best practices and strategies for how to securely adopt virtualization without constraining the innovation and flexibility it offers.

Self-Virtualizing Devices - In a session focused on new methods to achieve improvements with flexible, self-virtualizing PCIe devices, while also reducing costs, the Chief Scientist of Netronome Systems, Derek McAuley, will introduce delegates in New York to the notion of "Flexible I/O for Self-Virtualizing Devices."

Server-Based Security - In his New York session, Bill McGee - Co-Founder & VP of Technology at Third Brigade - will discuss the key security and compliance challenges affecting physical, virtual and cloud computing server environments.McGeee will discus how, though virtualization has poked serious holes into traditional perimeter security controls and cloud computing has effectively evaporated them, firewalls and IDS/IPS are not obsolete.

VDI - The journey to desktop virtualization will take many steps but will desktop environments be able to pass the Virtualization Turing Test? Ami Holder from Tranxition is giving a session in New York in which delegates will be able to learn about best practices for bringing their users’ personalized environments along to a VDI environment so they can achieve the cost benefits of VDI without imposing major disruption and lost productivity on their user base.

Virtual Security - Security is a critical issue that, left unaddressed, will ultimately negate many of the benefits or virtualization. Virtualization security expert Ted Ritter, from Nemertes Research, will be giving an intriguing session in NYC that covers the principal elements of virtualization security, the solutions and vendors in the space and recommendations for organizations that are struggling to secure the benefits of their virtualization efforts.

Virtualization Turing Test - see VDI

VM Densities - Systems management solutions are now available today that can help companies proactively and continually monitor resource utilization to better optimize current virtual infrastructure investments with the goal being to significantly increase VM densities and to lower the cost per VM. The Founder & CEO of VKernel will be giving a session in New York showing delegates how to get the most out of their existing virtualization hardware and software investments – instantly saving money and enabling them to even delay future hardware/capacity purchases, while still growing their environment and meeting performance standards.

Cloud Computing Technology Contributors of 2009
10Gen, 3Leaf Systems, 6fusion International, Absolute Performance, Ajaxo, Alentus, Appirio, Appistry, Aptaria, Arena Maxtronic, Arista Networks, Asankya Networks, BitRock, BlueLock, Boomi , Box.net, Canaan Partners, Casdex, Chris Richardson Consulting, CITTIO, Cloud Architects, Cloud9 Analytics, CloudRamp, CloudScale Networks, Cloudscape.ws, CloudWorks, CNI Systems, CohesiveFT, CollabNet, Concentric, Cordys, Cronus Partners, CSRware, CuperTek, Cycle Computing, Dataline, Dell, DNAmail, eBay, Elastra, Engine Yard, Enki Consulting, Enomaly, Excelian, Flexiscale, Forrester, Fortress ITX, G.ho.st, Gear6, GigaSpaces, GoGrid, GraphLogic, GridGain, IBRIX, InfoQ, IntelePeer, IronKey, Iterative Designs, ITO America, Jamcracker, Joyent, JumpBox, Just Skill, Kaavo, Linxter, Mohr Davidow Ventures, MessageLabs, Mimecast, Model Metrics, Moderro Technologies, Moka5 (MokaFive), Mosso, Netmagic, NewServers, Ocarina Networks, Panorama Software, Parabon Computation, Parallels, ParaScale, Patni Computer Systems, Peer1 Networks, Platform Computing, PLX Technology, ProjectLocker, Promise Technology, Qlayer, QlikTech, Rackspace, RampRate, Red Hat, Reliance Globalcom, RightScale, Robson Taylor, Rogue Wave, rPath, Salesforce.com, Sapotek, Saugatuck Technology, ScanSafe, ServePath, ServiceCloud, SIMtone, SkillSoft, Skytap, SmugMug, SOASTA, Solace Systems, Spiceworks, SpiderOak, Symphony Services, Tap In Systems, Teneros, Terremark, Transitive, Trend Micro, Union Square Advisors, Unisys, Univa UD, uTest, Vertica, Weber Shandwick, Widen Enterprises, XCalibre, Zabovo.com, Zeus Technology, and Zuora.

Virtualization Technology Contributors of 2009
123Together.com, 361 Degrees, 3PAR, 8e6 Technologies, A10 Networks, Aastra, Accario, Accellion, AccessFlow, AceNet, ACMA, Acronis, Actional, activePDF, Acxiom, Adaptec, ADC, Adder, Adexis, Adtran, Agilysys, Agito Networks, AirMagnet, Akorri, ALADDIN Knowledge Systems, Alcatel-Lucent, Alert Logic, AlterPoint, Altor Networks, AMAX, AMCC, Amyuni, Apani, APC, APCON, APM Experts, Appistry, Applied Innovations, Apptio, Aquantia, Arastra, Aravo, Arbor Solutions, ArcSight, Areohive Networks, Array Networks, Arrow ECS, ARTEC - Computer, Asigra, Asoka USA, Aspera, Astaro Internet Security, Atempo, ATEN Technology, Attune Systems, AutoVirt, Avanade, Avaquest, Avaya, Aventiv-NomaDesk, Avocent, AVTECH, AXIOMTEK, BakBone, BBN Technologies, BDNA, BEA Systems, Bedsole, Benchmark Capital, Berkeley Varitronics, BigFix, Bivio Networks, Blade Network, Blue Lane, BlueArc, BluePoint, BlueStripe, Bobcares, Bosanova, Brigh Technologies, Brocade, CA, CalAmp, Capitial Trust Ventures, Cassatt, Catbird, Cayenne, CDG, Ceedo, Certeon, Champion Solutions, Check Point Software, Chip PC, CiRBA, Citihub, Citrix Systems, ClearCube, CommVault, Compass America, Compellent, Compugen, Computer Lab International, Concentsus, Configuresoft, Continuity Software, Coraid, Courion, Coyote Point Systems, cPanel, Credit Suisse, Crosswalk, CrystalTech Web Hosting, CSC, Data Domain, Databarracks, DataCore, DataDirect, Datagardens, DataPipe, DataSynapse, DC3 Solutions, Dell, EqualLogic, Desktone, Devon IT, Digipede, Doctrino Systems, DocuSign, DoubleTake Software, Dynamic Network Factory, DynamicOps, Ecora Software, eG Innovations, Egenera, Electric Cloud, Electrorack, Embotics, Emulex, Endeavors Technology, Enigmatic, Enomaly, Entuity, EqualLogic, Ericom, EVault, Evolving Solutions, Exinda, eXludus, Extentrix Systems, F5Networks, FalconStor, Faronics, FastScale, FastSoft, FOCUS Consulting, Fortinet, Fortisphere, Fugitive LLC, Fujitsu Systems, Fusepoint, FusionStorm, Gateworks, Getronics, Gibraltar Solutions, GlassHouse Technologies, GlobalFluency, GlobalSCAPE, GlobalSign, Green Hills Software, Grid Dynamics, GRIDtoday, groupSPARK, Hiperware, Hitachi Data Systems, Hubspan, Hurricane Electric, Hyper9, HyPerformix, Hyperic, I2 Technology, IGEL Technology, Ignite Consulting, Illumita, IMEX Research, Incipient, Insight Venture Partners, InstallFree, INSYSTEK,Integrien, Ipswitch, Isilon Systems, iTrinegy, KACE, Kaseya, KI Lipton, Kidaro, Kingston Technology, KnownHost, Lanamark, LeftHand Networks, Lenovo, Leostream, Liquid Computing, Lucid8, LynuxWorks, Magirus, Mailtrust, Mainline, ManageIQ, ManageSoft, Marathon Technologies, Marketo, Markitects, McAfee, Meridian IT, Metron, Microsemi, Microserv, Mid-Atlantic Computers, MIMOS, Mimosa Systems, Mindbridge Software, Miva Merchant, MonoSphere, Morph Labs, Mxi Technologies. mySoftIT, Nagarro, Namescape, Ncomputing, NEC, Nemertes, NeoPath, Neoware, Net Magic, NetApp, Neterion, NetEx, NetIQ, Netuitive, Network Appliance, Neverfail, New Age Technologies, New Idea Engineering, NewTek, Nexenta, NextIO. Nimsoft, Niyuta, NoMachine, Nortel, Novell, Old Road Computing, Omnitron, On The Avenue, ONStor, Opalis Software, Open Kernel Labs, OpenHosting, OpenSpan, Optaros, Opus Capital, PacketTrap, Palm, Inc., Panda Security, Pano Logic, Pattern Insight, Peak IP Solutions, PHD Technologies, Phoenix Technologies, Phurnace Software, Pillar Data Systems, Pinnacle Cart, Pivot3, Platespin, Proofpoint, ProServeIT, ProSync, Provision Networks, , Q1 Labs, QG Software, Qualys, Quest Software, R1Soft, Racemi, RACKWISE, Radiant Logic, Raritan, Raxco Software, Red Hat, Reflex Security, Regan Technologies, Resolution Enterprises, RF Code, Riverbed, RSA Security, Ruckus Wireless, Sagent Solutions, SanDisk, SAVVIS, ScaleMP, Scalent Systems, ScienceLogic, ScriptLogic, Seanodes, Secure Command, Secure Computing, Sentillion, ServInt, Shavlik, Silpion, SIMtone, Singularity Technologies, Sitemasher, SmarterTools, Socialcast, SoftLayer, SolarWinds, SolutionSet, Sonasoft, SSH Communications Security, StackSafe, Starfire, SteelEye Technology, StillSecure, StoneFly, Stonesoft, Stoneware, StorageCraft, StorageNetworking.org, StorMagic, Stratus, Sun Microsystems , Oren Tech, SunView, Supermicro,, Surgient, SWsoft, Sycros, Symantec, Systar, Telecompute, The 451 Group, The Israeli Association of Grid Technologies, TheInfoPro, ThinkEquity Partners, ThinPrint, Third Brigade, Tideway, Tigerpaw, TOA Solutions, ToutVirtual, Train Signal, TRANGO Virtual Processors, Tresys Technology, Trigence, Tripwire, Twisted Pair Solutions, UK-2 Limited, Ulteo, UniPrint, United Devices, V.i. Labs, VaST Systems, VDIworks, VeeAm Software, Veodia, Verio, VeriSign, Vicom, Vigilar, VirtenSys, Virtera, Virtual Computer, Virtual Iron, VirtualizationChat.com, VirtualLogix, Virtugo, Virtutech, Visionapp, VisionCore, VKernel, VM People, VM6, VMLogix, vmSight, vThere, Vyatta, Wyse Technology, XDS, XenoCode, Xiotech, xkoto, Xsigo.

AJAX & RIA Technology Contributors of 2009
3Tera, Abaque, Accenture, AccuRev, AccuSoft, Active Endpoints, Active Inquiry, ActiveState, Actuate, Adaptive Blue, Adaptive Path, Adobe Systems, Afrous Dashboard, Agitar Software, AGOSYS, AJAX 13, Akamai, Alfresco, Allurent, Alpha Software, Altova, Amazon.com, Appcelerator, Appeon, Apple Computer, Applibase, , AppTrigger, Apress, Aptana, Aragon Consulting, Art & Logic, Ask Pivot, Asperon, Astreya, Atlassian, Aztecsoft, Azul Systems,, BackBase, Barracuda Networks, Baynote, BEA Systems, Bizwhazee, Black Duck, Blogtronix, BlueFolder, BlueTie, BondDesk, Borland, BOSSdev, Bottomline, BScaler, Bungee Labs, Burton Group, CambrianHouse, Canoo Engineering, Cassatt, Cast Iron, Catalyst Resources, Cenzic, Chordiant, CIGNEX, Cisco Systems, Cision, Citrix Systems, Claria, Clearspring, CodeFlare, Codign, Coghead, Cognizant, ComponentArt, ComponentOne, Conference Guru, Coradiant, Corent Technology, CoreSpeed, Corizon, Crescendo Networks, CSS Group, cStar Technologies, CSW Group, Curl, Cybage, Cynergy Systems, Dapper, Dassault Systèmes, DataDirect, Day Software, dCongo, deCarta, Dell, Denim Group, Denodo, Design Universe, DeviceAnywhere, Dialcom, Dice.com, DiscountASP.NET, DotNetNuke, Drangonfly, DreamFace Interactive, Dynamic Toolbar, DynaTrace, EffectiveUI, Egnyte, Ektron, Elastic Path, Elementool, EMC, Encanvas, ENOVIA Matrix One, EnterpriseDB, Ephox, esnips, ESRI, Etelos Systems, etouch, Evans Data, Exadel, ezAJAX, F5 Networks, FeedbackFX, Fig Leaf Software, Finetooth, Fiorano Software, firstRain, FiveRuns, Foldera, Force10 Networks, Fortify, Forum Systems, Fotango, Freewebs, froglogic, Funambol, FundingPost, Furtherahead.com, Fusion Technologies, Gaggle.Net, GemStone, genius.com, Genuitec, Gizmox, Glassbox, GoGrid, Gomez, Inc., GreenHat, GreenPoint, GridApp Systems, Groupware Technology, Helmi Technologies, Hitachi America, Hosting.com, HostMySite.com, HP Software, Hummer Winblad Venture Partners, Ibiza Software, IBM, ICEsoft, ILOG, Impetus, iNetOffice, Infinilogic, Infragistics, Ingres, Inimit, Innominds, Innoopract, inpowr, InsideView, Instancy, Instantiations, Integration New Media, Intel, IntelliObjects, Intelliun, Interactive Networks, InterSystems, Isomorphic, IT Mill, ITtoolbox, JackBE, JadeLiquid, JasperSoft, Javeline, JBoss, JellyCloud, JetBrains, Jive Software, K2, Kaazing, Kapow, Keynote Systems, KonoLive, Krugle, Laszlo Systems, Lightstreamer, M/Gateway, Magic Software, Mainsoft, Manning Publications, Marathon Technologies, Mashery, Mashmatrix, MaxiScale, MB Technologies, Metia Software, Microsoft, Midnight Coders, Molecular, MomentumSI, Morfik, Neocleus, Neotys, Netfective, Netmite, NetSuite, Nexaweb, Nextapp, NextAxiom, NextDB.net, Nirvanix, Nitobi, Northwoods Software, Novell, Novulo, OASIS, ObjectWave, OpenLink, OpenLogic, OpenSpot, OpenWave, OPNET, OpSource, Oracle, OrangeHRM, OSS Nokalva, Parasoft, Passport Corporation, Pentaho, Perforce, Pervasive Software, Primavera Systems, PushToTest, QLogic, Quasar Technologies, Quest Software, Rackable Systems, Radialpoint, RadView Software, Rearden Commerce, Recursion Software, Red Hat, Roaring Penguin, Salesforce.com, SAP, Saven Technologies, Scalix, Servoy, SkillBuilders, Skyway, SL Corporation, SlickEdit, SnapLogic, SOA Software, Software AG, Software FX, Sonic Software, SoonR, Splunk, SugarCRM, Sun Microsystems, Sybase, iAnywhere Solutions, Symphoniq, TeaLeaf Technology, Tele Atlas, telerik, ThinkFree, TIBCO Software, TriveraTechnologies, Valtech, Visual Mining, VMware, Vocus, WatchFire, WaveMaker, Web Spiders, WebAppCabaret, Webtide, Wipro, WSO2, XAware, Xenos, Xythos Software, Yahoo!, Zapatec, ZCubes, Zimbra, ZOHO, and Zoovy.

SOA / WOA Technology Contributors of 2009
/n Software, Aberdeen Group, Abovo Group, AccelTree, activePDF, ActiveServers, Actuate, AdventNet, AgentWare, Agilent Technologies, AgilePath, Altova, AmberPoint, AMD, Amentra, American Coders, Amyuni, AppSense, Apptricity, Aprimo, Arbortext, Attachmate, Autodesk, Azul Systems, BEA Systems, B-hive, Black Hat, BlackDuck Software, BlueNote Networks, BMC Software, Borland, BroadVision, Business Objects, CA, CalAmp, CapGemini, Catalyst Systems, CheckFree, ClearApp, Codagen, COGNOS, ComponentSource, Composite Software, CSC, Compuware, Covalent, DevelopMentor, DigitalAssets, Eclipse.org, Embarcadero Technologies, EnterpriseDB, Fair Isaac, Farata Systems, Fiorano, Forum Systems, Fuego, Fujitsu, Gartner Group, Gizmox Systems, Global Knowledge, Gluecode Software, GT Software, Gutenberg Communications, HP, HiT Software, Hitachi, HP Bluestone, Information Builders, Interwoven, Ipedo, iTKO, J9 Technologies, Jacada, JustSystems, Layer 7 Technologies, LogicLibrary, LogiXML, MacroVision, Maestro CMS, Magoo Software, McAfee.com, Mellanox, Micro Focus, Mindreef, MKS / Mortice Kern Systems, NASTEL Technologies, NEON Systems, NetIQ, OMG, Object Management Group, ObjectBuilders, ObjectFocus, Objective Solutions, Open Text, OpenLogic, OpenMake, OpenSpan, OpTier, Optika, Oracle, PaperThin, PerfectXML, Perficient, Inc, preEmptive Solutions, Progress Software, Prolifics, Rackspace, Red Hat / JBoss, Rogue Wave, RSA Security, SAP, Sapiens, Seagull Software, Seapine Software, ServerLogic, SOALogix, SOAMatrix, Sonic Software, SpikeSource, StrikeIron, Sybase, Telelogic, Teradata, Thinstall, Thoughtworks, TIBCO Software, Tidal Software, VeriSign, Versant, Versata, Vertigo Software, Visual Numerics, Vitria, Vordel, Wakesoft, Web Age Solutions, WebLayers, Webmetrics, Websense, Wily Technology, WinMill Software, WSO2, XMethods, XMLCities, ZapThink, and Zend Technologies.

More Stories By Jeremy Geelan

Jeremy Geelan is Chairman & CEO of the 21st Century Internet Group, Inc. and an Executive Academy Member of the International Academy of Digital Arts & Sciences. Formerly he was President & COO at Cloud Expo, Inc. and Conference Chair of the worldwide Cloud Expo series. He appears regularly at conferences and trade shows, speaking to technology audiences across six continents. You can follow him on twitter: @jg21.

Comments (4) View Comments

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Most Recent Comments
SaaSPlex 12/18/08 01:33:58 PM EST

It might also be worth checking out SaaSPlex. www.saasplex.com

The SaaSPlex platform was developed to address some of the operational and business issues which start to occur as organizations move from the traditional model of addressing application delivery to a utility model of delivery. Some time ago we in SaaSplex recognized that technology and infrastructure would enable the delivery of real SaaS applications to the marketplace. As a result we believed that organizations would look to align the IT spend more closely to their business objectives.

When an organization makes the move to SaaS and deploys a single application no real compromise of control is experienced, however when a second or third is added and if other web enabled applications follow suit the environment becomes harder to manage. Now imagine organizations wanting to offer multiple SaaS apps to thousands of end user organisation (e.g Telcos) how could they manage this environment? Looking ahead to Telco 2.0 and the stated aim of delivering apps as part of their strategy for the next few years and we in SaaSPlex saw an opportunity which we wanted to address.

The SaaSPlex platform is designed to manage the delivery of Multiple SaaS applications to multiple (or single) organisations with a single management platform.

It delivers: Automated deployment of any web enabled application into the cloud, Single sign on for users to all apps, Resource Management, User Management and billing.

for more feel free to contact us.

wlouth 11/10/08 04:23:06 PM EST

You forgot JINSPIRED which has delivered the first feature rich and scalable activity-based costing (ABC) solution for enterprise applications that dynamically assigns costs to applications, services and components based on multi-resource consumption, delivering a unified approach to performance management and cost management for cloud computing.

A Unified Approach To Performance Management and Cost Management
http://www.jinspired.com/products/jxinsight/meteringthecloud.html

Our recent product release news.
http://www.jinspired.com/products/jxinsight/new-in-5.7.html

By the way I find it hard to imagine any serious cloud computing management solution being based on a central management server architect and using traditional costing approaches unless we are talking about a basic status solution.

William

stevecrawf 11/10/08 12:30:30 PM EST

http://www.jamcracker.com .

Jamcracker provides cloud-based provisioning services that enable channel partners of all shapes and sizes (from MSPs to Tier 1 Carriers) to resell name-brand as well as niche-focused on-demand services, many of which are listed in this posting.

The commercials, in addition to connectivity, are based on Master Distribution Agreements that Jamcracker has negotiated, on behalf of its distribution partners, with the SaaS ISVs.

A complete SaaS Catalog (or Cloud Catalog...) of services available within the Jamcracker Services Delivery Network is available at http://www.saascatalog.com .

appnexus 11/07/08 03:46:29 PM EST

AppNexus offers scalable, enterprise-level, self-service hosting, that is fast, reliable, secure, and transparent. You can run any OS you want on our cloud. Please visit wiki.appnexus.com for more information.

@ThingsExpo Stories
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...