Untitled Document
  Home
Cloud Expo ®
Big Data
Things Expo
DevOps
WebRTC Summit
Untitled Document
2017 East
Premium Sponsors
Diamond



Platinum
@DevOpsSummit

@DevOpsSummit

Silver
@DevOpsSummit


Bronze










Untitled Document
2017 East Exhibitors
@DevOpsSummit




































Untitled Document
2016 West
Premium Sponsors
Platinum Plus



Silver
@ThingsExpo

Bronze







Untitled Document
2016 Welcome Reception Sponsor

Untitled Document
2016 West Exhibitors










@DevOps Summit






@DevOps Summit

@WebRTC Summit












@WebRTC Summit









@DevOps Summit

Untitled Document
2016 West Media Sponsors











Untitled Document
2016 East Gold Sponsors

@ThingsExpo

Untitled Document
2016 East Silver Sponsors


@DevOps Summit

Untitled Document
2016 East Bronze Sponsors

Cloud Expo







Cloud Expo

Untitled Document
2016 East Exhibitors

@DevOps Summit





@ThingsExpo



@DevOps Summit

@ThingsExpo


@DevOps Summit









@DevOps Summit







@DevOps Summit










Untitled Document
2016 East Vendor Presentation Sponsors

@DevOps Summit

Untitled Document
2015 West Gold Sponsor

Untitled Document
2015 West Silver Sponsor


Untitled Document
2015 West Bronze Sponsors

Cloud Expo |@ThingsExpo

Cloud Expo | DevOps Summit


@ThingsExpo





@DevOps Summit

@ThingsExpo


@ThingsExpo

Untitled Document
2015 West Exhibitors












@DevOps Summit





@DevOps Summit












@DevOps Summit

@DevOps Summit




@ThingsExpo


@DevOps Summit


Untitled Document
2015 West Session Sponsor

Untitled Document
2015 West E-Bulletin Sponsor

DevOps Summit

Untitled Document
2015 West
Association Sponsors

Untitled Document
2015 West
Media Sponsor

Untitled Document
2015 East Platinum Sponsor


Untitled Document
2015 East Gold Sponsor


WebRTC Summit

DevOps Summit

Untitled Document
2015 East Silver Sponsor

DevOps Summit

WebRTC Summit


Untitled Document
2015 East Bronze Sponsor

DevOps Summit

Cloud Expo | DevOps Summit
@ThingsExpo

DevOps Summit

DevOps Summit

Untitled Document
2015 East Exhibitors


DevOps Summit


@ThingsExpo



DevOps Summit







Cloud Expo | @ThingsExpo

@ThingsExpo
@ThingsExpo
DevOps Summit

DevOps Summit
@ThingsExpo
DevOps Summit
DevOps Summit
DevOps Summit
DevOps Summit
DevOps Summit



@ThingsExpo

Untitled Document
2015 East E-Bulletin Sponsor

DevOps Summit

Untitled Document
2015 East
Association Sponsors

Untitled Document
2015 East
Media Sponsor

Untitled Document
2014 Diamond Sponsor

Untitled Document
2014 East Platinum Plus Sponsors

Untitled Document
2014 East Platinum Sponsors

DevOps Summit

Untitled Document
2014 East Gold Sponsor

DevOps Summit

Untitled Document
2014 East Silver Sponsors

DevOps Summit
DevOps Summit

Untitled Document
2014 East Track Sponsor

DevOps Summit

Untitled Document
2014 East Bronze Sponsors

Internet of Things Expo

Untitled Document
2014 East Exhibitors

DevOps Summit
Internet of Things Expo
DevOps Summit
DevOps Summit
DevOps Summit
WebRTC Summit
DevOps Summit
DevOps Summit

Untitled Document
2014 East Mobile App Sponsor

Untitled Document
2014 West Gold Sponsors

Untitled Documen<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title>Untitled Document
2014 West Bronze Sponsors

Internet of @ThingsExpo
DevOps Summit
Internet of @ThingsExpo DevOps Summit


Untitled Document
2014 West Exhibitors

WebRTC Summit
DevOps Summit
@ThingsExpo
DevOps Summit


@ThingsExpo
@ThingsExpo
DevOps Summit
DevOps Summit
WebRTC Summit
WebRTC Summit
DevOps Summit

Untitled Document
2013 West Association Sponsors

Untitled Document
2014 East
Media Sponsor

Untitled Document
2013 West e-Bulletin Sponsors

Untitled Document
2013 West Platinum Plus Sponsor

Untitled Document
2013 West Platinum Sponsor

Untitled Document
2013 West Oracle Workshop

Untitled Document
2013 West Media Sponsors

Untitled Document
2013 West Gold Sponsors

Untitled Document
2013 West Exhibitors

Untitled Document
2013 West Diamond Sponsor

Untitled Document
2013 West Bronze Sponsors

Untitled Document
2014 East
Association Sponsors

Untitled Document
2013 West Consortium Sponsor

From the Blogosphere

Mouse gestures are one of those great "add-ons" that enhance browser usability. For those that are not familiar with mouse gestures, they are a browser navigational aid that works via mouse movements. Mouse gestures have been around for some time now and we thought it would be good to ...
One of the dirty little secrets about security: there is simply no way to make your company impervious to a data breach. It's almost a statistical certainty that you will, at some point or another, be hit with a security scenario that you're not prepared for. That's why security today ...
TIBCO is traditionally known for its leadership in integration and is now expanding into a number of new areas through acquisitions as well as building new capabilities. This post is to analyze their products based on attendance to their annual TUCON conference. Making decisions in a...
There is truly a difference in terms of scope, application and business need between security "in" the cloud and security "from" the cloud. No, this isn't 7th grade English...I promise. With all the important decisions IT departments make, what’s the big deal whether cloud security m...
Emergence is good, but… …it takes time, and …under some circumstances it may not happen! If you have been there … done that … then you don’t have to wait for your application architecture to emerge over several iterations. You can use your past experience to nail it down at the begi...
Recently, I’ve been working closely with a number of large enterprise clients who have already gone or will soon go live with Layer 7 solutions at the core of mission-critical infrastructure. I’ve observed that, in the API Management space, proof of concept and initial projects often f...
Is the term “Gamification” a buzzword or is it a real trend which will change the way things are sold … services are delivered? Is it a fad or is it fundamentally life altering trend? Is it something new or is it an old wine in a new bottle? If you are not familiar with the term the...
…is that they're consumer cloud services. While we're all focused heavily on the challenges of managing BYOD in the enterprise, we should not overlook or understate the impact of consumer-grade services within the enterprise. Just as employees bring their own devices to the table, s...
Does analysis lead to synthesis? How do you solve a complex problem? Break the complex problem into sub-task till each task is clearly understood and doable. Assign responsibility and monitor each task till they are complete. Once all tasks are completed the problem is solved! Wel...
Assume that you are trying agile for the first time. If the project succeeds then everybody is happy. But… What happens if the project fails? Did the project fail because your agile implementation was wrong? …or… Did it fail it because agile was not the right methodology for your p...
One of the phrases you hear associated with cloud computing is "architecting for failure." Rather than build in a lot of hardware-level redundancy – power, disk, network, etc… – the idea is that you expect it to fail and can simply replace the application (which is what you care about ...
The ability to conduct effective performance testing has become a highly desired skillset within the IT industry. Unfortunately, these highly sought-after skills are consistently in short supply. "Front-end testers" can work with a tool to create a realistic load and although this is a...
Have you ever encountered a situation where 2 of the 5 members of an agile team decides to move on within a short span of time. What about 3 out of 5? What did you do when that happened? Yes, I know you are saying that the situation should either have been anticipated or prevented. Y...
Agile manifesto explicitly states that agile values individual and interactions over process and tool. What does it really mean? Does it mean… …do not be a slave to the process, or …it is not necessary to have a clearly defined way of working, or …every individual can choose to w...
Moving to a model that utilizes the cloud is a huge proposition. You can throw some applications out there without looking back – if they have no ties to the corporate datacenter and light security requirements, for example – but most applications require quite a bit of work to make th...
BYOD remains a topic of interest as organizations grapple not only technologically with the trend but politically, as well. There are dire warnings that refusing to support BYOD will result in an inability to attract and retain up and coming technologists, that ignoring the problems as...
1972: Most commonly used languages (Cobol, Fortran, Algol, PL/1, Basic, APL) all had complicated syntax. The prevailing thought process was to add new language syntax for every new feature. Writing a compiler for such languages was a nightmare. Then came “C”. The syntax was simple and...
Recently, I was involved in a project that was migrating from Hyper-V Server 2008 R2 to Hyper-V Server 2012. Due to architectural changes involved in implementing the new features in Hyper-V Server 2012, a direct in-place upgrade is not possible. However, the across-the-wire migratio...
Do you agree that the agile team may not possess all the specialized skills and technical knowledge required for the project? You may argue that the team should be so constituted that team members among themselves have skills and knowledge required – but is that always feasible? Wha...
Does Agile project require a project manager? Or, is a scrum master, who is a coach cum facilitator, sufficient? If you search the net you will find defenders of both side of the argument but of late the pro “need to have a project manager” view seem to be winning. Even PMI has a ce...
The cyber security market in 2012 is estimated at $60 billion, yet adding more and more layers of perimeter security may lead to a false sense of security and be completely useless against a determined system administrator working on the inside. The end result is that your data might b...
WebRenderer is one of those SDKs that can appear overwhelming on first look. For this reason we always shipped a “bare bones” Test Browser (TestBrowser.java) with the product. The Test Browser has at times baffled people due to it’s lack of features. The Test Browser was “featureless” ...
One of the twelve principles supporting agile manifesto is: Build projects around motivated individuals. Give them the environment and support they need, and trust them to get the job done. But, in a real life organization setup just trusting the team to get the job done may not be ...
Recently I've been thinking about what happens to an identity through its life cycle and how the identity data is treated during this process. I think you will also see that the Enterprise itself has differing methods of dealing with it as well. I am considering this to be the beginni...
You would definitely like to deliver the right software without defect on schedule. But in real life… Imagine a situation where your software delivery date is very near and everything is under control. You are almost ready with the tested software. Suddenly you receive a request for c...
The number one IT issue for all enterprises today is delivery - responding to business demand for change in ever faster timescales, at lower cost. But in the typical large enterprise, IT is widely perceived to be incapable of responding in a reasonable timeframe and cost. There are man...
If your .NET application was to run a sprint, would it win the race? To determine whether your application meets its performance objectives (and wins the race) and to help identify bottlenecks, you need to measure your application’s performance and collect metrics. Metrics of particul...
Many software company have embraced some variant of this motto. This is the right thing to do … after all who wants software which has bugs. It is an open and shut case – right? Or is it? … Especially in the context of agile development. Let us start by asking two stupid question: H...
HTML5 is the latest iteration of the standard used by web programmers and developers. When completed in 2014, it will enable developers to write-once-run-anywhere (WORA) for consistent, cross-platform experiences across all operating systems and browsers. For example, a developer could...
With every passing day, Big Data assumes new strength as a significant force in our industry. Someone even said that Big Data is transforming business same way IT did few decades ago. The overall revenue (includes hardware, software, service) for Big Data is said to be around $5.1B ...
Do you know of any organization which does not have an annual budgeting process? Do you know of any organization which does not do an ROI analysis before deciding to fund a project? There may be smaller projects which come out of the discretionary fund of a sponsor but any project of...
I frequently find myself thinking that the dumbest thing we Internet marketers ever did in social networking was to rename it social media. In the early days of Web 2.0, there was no such thing as social media. Everyone was just working to make software more social, whatever that mean...
If you had the chance of working in an organization which has received SEI-CMMi certification then you would definitely be familiar with the concept of: Requirement Baselining Requirement Traceability Matrix (RTM) If you are not familiar with these terms then the best place to look is ...
As many readers may know, Facebook replaced their HTML5 version of their mobile app a few weeks ago, in favor of a native application written in Object C. It is much faster and smoother now, however, several functions disappeared with this change. You can no longer just steal your f...
One of the interesting side effects of having been a developer before migrating to a more network-focused view of the world* is it’s easier to understand the limitations and constraints posed on networking-based software, such as web servers. During the early days of virtualization ad...
August seems to have been the month for a huge raft of storage-related announcements and I’m still getting to grips with the detail, after being away on holiday for the whole month. As I start to pick out the news and make sense of how it fits into the storage landscape, I thought I’d...
With the endorsement by the Federal Financial Institutions Examination Council (FFIEC), smaller financial institutions which a beholden to many compliance audits and security issues can now explore the possibility of outsourcing security features from the cloud. Now these organizations...
Samsung is unveiling a bevy of electronics, including, the Note 2, a Windows Phone 8 (Ativ S), a touchscreen Windows 8 laptop, and more – the Galaxy Note 2 looks pretty amazing, but while I like the device and size as a secondary device, I could never use it to make phone calls. With t...
Yesterday I had to record a 2-hour long webinar. The resulting .mov file was about 1Gb in size. Then I needed to cut out a 40-minute fragment from this movie and save it as a separate file. Doesn’t look like an overly complicated task, does it? Started iMac on my MacBook Pro, which is ...
Windows Server 2012 Essentials, which will ultimately replace the existing Small Business Server (SBS) and Home Server products, has reached the Release Candidate milestone! Essentials provides a simple to install and configure version of Windows Server 2012 intended for Small Busines...


Register and Save!
Save $205
on your “Golden Pass”!
before June 5, 2017!
Call 201.802.3020


New York Call For Papers Open
Submit
submit your speaking proposal
for the upcoming Cloud Expo in
New York!
[June 6-8,2017]


Cloud Expo 2017 East
Sponsorship Opportunities
Please Call
201.802.3021
events (at) sys-con.com
Sponsorship opportunities are now open for Cloud Expo 2017 New York, June 6-8, 2017, at the Javits Center in New York City, New York, and for Cloud Expo 2017 Santa Clara, Oct 31-Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara,CA. For sponsorship, exhibit opportunities and show prospectus, please contact Carmen Gonzalez, carmen (at) sys-con.com.

Cloud Expo Silicon Valley All-Star Speakers Include

RICHARDS
Venafi

SINGH
IBM

NIELSON
Redis Labs

FRIEDMAN
Edge

THIELE
Apcera

MONTE-
CILLO

IBM

SPROULE
Metavine

REUVENI
Jet

CHITTURI
Sungard

CEPPI
Canonical

HAFF
Red Hat

MATTHIEU
Octoblu

MAHADEV
Cisco

MCCARTHY
Bsquare

FELICIANO
AMDG

PAUL
VenueNext

SMITH
Eviot

BEAMER
goTraverse

GETTENS
goTraverse

CHAMBLISS
ReadyTalk

BLACK
SQLstream

KOCHER
Grey Heron

VISWA-
NATHAN

Cognizant

LARSSON
Qosmos

COHEN
Institute

SCHEELE
Loodse

HERBERTS
Cityzen Data

REITBAUER
Dynatrace

WILLIAM-
SON

Cloud
Computing

FEATHER-
STON

Collaborative
Consulting

SEHGAL
Tintri

SRINIVAS
IBM

AHUJA
Impiger

SUDH-
AKAR

Splunk

TISH-
GART

Cloudera

SCHMARZO
EMC

KENDRICK
Isomorphic

KUCKEIN
DDN

WOOD
VeloCloud

WALLGREN
Electric Cloud

VARAN-
NATH

GE

RAVE
Teridion

CHOU
Microsoft

SRIDHARA-
BALAN

Pulzze

SHARIF
Aporeto

JAME-
NSKY

Embotics

METRIC
Linux

MONTES
Iced

ARIOLA
Parasoft

HOLT
Daitan

CUNNING-
HAM

ReadyTalk

BEDRO-
SIAN

Cypress

NAMIE
Cisco

JENKINS
IBM

DOYLE
eCube

THOM-
CHICK

Symantec

BRENTON
CollabNet

BERCO-
VICI

SolidFire

NAKA-
GAWA

Transparent
Cloud

SHIBATA
Transparent
Cloud

BOYD
Neo4j

BABIN
Kaltura

VANDER-
MINDEN

Flatiron
Strategies

MORAN
BMC

CASEY
CFN

ZHENG
CDS

WARD
DWE

DEMEO
Alfresco

STIGTER
TIBCO

MILLER
Covisint

EVAVOLD
Covisint

MEINER
Oracle

MEEHAN
Esri

WITECK
Citrix

LEUFFEN
Wrecker

ROGERS
Anexia

NEW
HOUSE

Agilitiv

DE MENO
Commvault

VAN TUIN
Red Hat

LIANG
Rancher Labs

BUTLER
Tego

MURTHY
Cloud Raxak

REMIL-
LARD

Microsoft

MANN
Splunk

ROWE
IBM Cloud

SKILLERN
Intel

ALLEN
Progress

BENEDICT
Cognizant

SMITH
Numerex
Cloud Expo New York All-Star Speakers Include

DE MENO
Commvault

ERWAY
Appneta

KEYS
ConsenSys

HINCH-
CLIFFE

7Summits

DOYLE
eCube

CHAVES
Pythian

BLOOMBERG
Intellyx

BUGAYENKO
Teamed.io

LAWSON
NewSci

HAFF
RedHat

HOLT
IBM

Jewell
Codenvy

MORGENTHAL
CSC

ARMSTRONG
AppNeta

DWYER
Iron.io

MATSUMURA
Gradle

WARFIELD
Coho

CLELAND
HGST

VASILIOU
Catchpoint

WALLGREN
Electric Cloud

DE SOUZA
Cisco

RANDALL
Gartner

ARMSTRONG
AppNeta

SMALLTREE
Cazena

MCCARTHY
Bsquare

DELOACH
Infobright

QUINT
Ontegrity

MCLAUCHLAN
Buddy Platform

MCCALLUM
Falconstor

GRECO
Kaazing

PRESLEY
Pythian

LOVELL-TROY
Pythian

PALIOTTA
Vector

ATCHISON
New Relic

BHUSVANE-
SHWARI

Microsoft

MITRA
Cognizant

KOCHER
Grey Heron

GUCCIONE
Keeper

PAPDO
POULOS

Cloud9

FLOREA
Tintri

HARLAN
Two Bulls

GOLO
SHUBIN

Bit6

KERBY
BMC

PROIETTI
Location
Smart

MARTIN
nfrastructure

RAO
Asurion

BRENTON
CollabNet

MOULINE
Everbridge

MARSH
Blue Pillar

SRINIVASAN
Symantec

GALBRAITH
HPE

NEWTON
Alfresco

PARKS
SecureRF

PEROTTI
Plantronics

ROGERS
Anexia

HOFFMAN
EastBanc

MORRISH
Interoute

TIFFANY
SoftLayer

OSTROVER-
KHYI

Mobidev

LEWIS
Formation
Data

KENDRICK
Isomorphic

WATSON
Trendalyze

BENSONOFF
Unigma

REEVES
Datical

WALLER-
STORFER

Dynatrace

CIOT
Progress

SHAN
CTS

MATTELA
Redpine

MOR
Cloudyn

GILLEN
Spark
Coginition

SOLT
Netvibes

BERNARDO
GE Digital

ROMANSKY
TrustPoint

LEFORT
BMC

ANDERSON
BMC

BRODY
Webair

NIELSEN
Redis Labs

BEAMER
GoTransverse

LESTER
LogMeIn

PONO
-MAREVA

Google

SINGH
Sencha

CALKINS
Amadeus

SEHGAL
Tintri

KLEIN
Rachio

MANN
Splunk

HOASIN
Aeris

SARKARIA
PHEMI

SPROULE
Metavine

YOO
Fuze

SNELL
Intel

COTY
Alert Logic

LANDA
Kintone

CHOQUETTE
RackN

MARTIN
Security

LEVINE
CytexOne

ALLEN
Freewave

HURWITZ
Hurwitz & Assc.

HYEDT
Seamless

SWANN
Adobe

NGUYEN
Adobe

OXENHORN
FalconStor

RAJAGO-
PALAN

ACCELERITE

DESH-
PANDE

ACCELERITE

MURTHY
Cloud Raxak

HARRIS
Cloud Raxak

COLE
Peak 10

HUYNH
VAN

Glue Networks

SOBHANI
Constellation

BERMING
HAM

SIOS

STEELE
Hanu

AKELA
Appdynamics

DOWNEY
BMC

ERRAM
OUSPE

Spanning

SAADI
Govplace

JACOBS
Singlehop

KEE
GlobalSign

Cloud Expo Silicon Valley All-Star Speakers Include

KOWALL
AppDynamics

VAN TUIN
Red Hat

DEMMER
Jut

COHEN
Netflix

MUCHANDI
Red Hat Inc

BORELLO
Sysdig

GILPIN
Conjur

KANADE
Harbinger
Systems

GORBACHEV
Systems
Services Inc.

SUSSMAN
Coalfire

KHAN
Solgeniakhela

CHOKSI
Harbinger
Systems

DE MENO
CommVault

BLOOMBERG
Intellyx

BUGWADIA
Nirmata

COTY
Alert Logic

FLETCHER
Alert Logic

CAUTHRON
NIMBOXX

LYNN
AgilData

WAGNER
Cloudyn

ANAND
Appocito

WEISS
Pythian

BRODY
Webair

JACKSON
Softlayer

DAVIDSON
Juniper

HOFFMAN
Pivotal

VERVAET
HGST

Murthy
CloudRaxak

FRANCISCO
Evolute

LETCHIN
Nexenta

SIMON
JFrog

BONIFAZI
Solgenia

WEISS
ProfitBricks

HOLT
IBM

HANNON
SoftLayer

GALLO
SoftLayer

SAYEGH
Codero

BIMMU
Clouber

SRINIVAS
IBM

CHAVAN
IBM

HEDGES
Clouddata

AHUJA
Cloud

MEINER
Oracle

SWARTZ
Ericsson
Cloud Expo New York All-Star Speakers Included

DE SOUZA
Cisco

POTTER
SafeLogic

ROBINSON
CompTIA

WARUSA
-WITHANA

WSO2 Inc

MEINER
Oracle

CHOU
Microsoft

HARRISON
Tufin

BRUNOZZI
VMware

KIM
MapR

KANE
Dyn

SICULAR
Basho

TURNER
Cloudian

KUMAR
Liaison

ADAMIAK
Liaison

KHAN
Solgenia

BONIFAZI
Solgenia

SUSSMAN
Coalfire

ISAACSON
RMS

LYNN
CodeFutures

HEABERLIN
Windstream

RAMA
MURTHY

Virtusa

BOSTOCK
IndependenceIT

DE MENO
CommVault

GRILLI
Adobe

WILLIAMS
Rancher Labs

CRISWELL
Alert Logic

COTY
Alert Logic

JACOBS
SingleHop

MARAVEI
Cisco

JACKSON
Softlayer

SINGH
IBM

HAZARD
Softlayer

GALLO
Softlayer

TAMASKAR
GENBAND

SUBRA
-MANIAN

Emcien

LEVESQUE
Windstream

IVANOV
StorPool

BLOOMBERG
EnterpriseWeb

BUDHANI
Soha

HATHAWAY
IBM Watson

TOLL
ProfitBricks

LANDRY
Microsoft

BEARFIELD
Blue Box

HERITAGE
Akana

PILUSO
SIASMSP

HOLT
IBM Cloudant

SHAN
CTS

PICCININNI
EMC

BRON-
GERSMA

Modulus

PAIGE
CenturyLink

SABHIKHI
Cognitive Scale

MILLS
Green House Data

KATZEN
CenturyLink

SLOPER
CenturyLink

SRINIVAS
EMC

TALREJA
Cisco

GORBACHEV
Systems Services Inc.

COLLISON
Apcera

PRABHU
OpenCrowd

LYNN
CodeFutures

SWARTZ
Ericsson

MOSHENKO
CoreOS

BERMINGHAM
SIOS

WILLIS
Stateless Networks

MURPHY
Gridstore

KHABE
Vicom

NIKOLOV
GetClouder

DIETZE
Windstream

DALRYMPLE
EnterpriseDB

MAZZUCCO
TierPoint

RIVERA
WHOA.com

HERITAGE
Akana

SEYMOUR
6fusion

GIANNETTO
Author

CARTER
IBM

ROGERS
Virtustream
Cloud Expo Silicon Valley All-Star Speakers

TESAR
Microsoft

MICKOS
HP

BHARGAVA
Intel

RILEY
Riverbed

DEVINE
IBM

ISAACSON
CodeFutures

LYNN
HP

HINKLE
Citrix

KHAN
Solgenia

SINGH
Bigdata

BEACH
SendGrid

BOSTOCK
IndependenceIT

DE SOUZA
Cisco

PATTATHIL
Harbinger

O'BRIEN
Aria Systems

BONIFAZI
Solgenia

BIANCO
Solgenia

PROCTOR
NuoDB

DUGGAL
EnterpriseWeb

TEGETHOFF
Appcore

BRUNOZZI
VMware

HICKENS
Parasoft

KLEBANOV
Cisco

PETERS
Esri

GOLDBERG
Vormetric

CUMBER-
LAND

Dimension

ROSENDAHL
Quantum

LOOMIS
Cloudant

BRUNO
StackIQ

HANNON
SoftLayer

JACKSON
SoftLayer

HOCH
Virtustream

KAPADIA
Seagate

PAQUIN
OnLive

TSAI
Innodisk

BARRALL
Connected Data

SHIAH
AgilePoint

SEGIL
Verizon

PODURI
Citrix

COWIE
Dyn

RITTEN-
HOUSE

Cisco

FALLOWS
Kaazing

THYKATTIL
TimeWarner

LEIDUCK
SAP

LYNN
HP

WAGSTAFF
BSQUARE

POLLACK
AOL

KAMARAJU
Vormetric

BARRY
Catbird

MENDEN-
HALL

SUPERNAP

SHAN
KEANE

PLESE
Verizon

BARNUM
Voxox

TURNER
Cloudian

CALDERON
Advanced Systems

AGARWAL
SOA Software

LEE
Quantum

OBEROI
Concurrent, Inc.

HATEM
Verizon

GALEY
Autodesk

CAUTHRON
NIMBOXX

BARSOUM
IBM

GORDON
1Plug

LEWIS
Verizon

YEO
OrionVM

NAKAGAWA
Transparent Cloud Computing

SHIBATA
Ubiquitous Corp

NATH
GE

GOKCEN
GE

STOICA
Databricks

TANKEL
Pivotal Software

Follow @CloudExpo on Twitter


Testimonials
This week I had the pleasure of delivering the opening keynote at Cloud Expo New York. It was amazing to be back in the great city of New York with thousands of cloud enthusiasts eager to learn about the next step on their journey to embracing a cloud-first worldl."
@SteveMar_Msft
General Manager of Window Azure
 
How does Cloud Expo do it every year? Another INCREDIBLE show - our heads are spinning - so fun and informative."
@SOASoftwareInc
 
Thank you @ThingsExpo for such a great event. All of the people we met over the past three days makes us confident IoT has a bright future."
Yasser Khan
CEO of @Cnnct2me
 
One of the best conferences we have attended in a while. Great job, Cloud Expo team! Keep it going."

@Peak_Ten


Who Should Attend?
Senior Technologists including CIOs, CTOs & Vps of Technology, Chief Systems Engineers, IT Directors and Managers, Network and Storage Managers, Enterprise Architects, Communications and Networking Specialists, Directors of Infrastructure.

Business Executives including CEOs, CMOs, & CIOs , Presidents & SVPs, Directors of Business Development , Directors of IT Operations, Product and Purchasing Managers, IT Managers.

Download Cloud Expo Show Guide
Cloud Expo Show Guide
Download PDF

Join Us as a Media Partner - Together We Can Rock the IT World!
SYS-CON Media has a flourishing Media Partner program in which mutually beneficial promotion and benefits are arranged between our own leading Enterprise IT portals and events and those of our partners.

If you would like to participate, please provide us with details of your website/s and event/s or your organization and please include basic audience demographics as well as relevant metrics such as ave. page views per month.

To get involved, email Lissette Mercado at [email protected].

@CloudExpo Blogs
The nature of test environments is inherently temporary—you set up an environment, run through an automated test suite, and then tear down the environment. If you can reduce the cycle time for this process down to hours or minutes, then you may be able to cut your test environment budgets considerably. The impact of cloud adoption on test environments is a valuable advancement in both cost savings and agility. The on-demand model takes advantage of public cloud APIs requiring only payment for the time needed to run automated tests. In this framework, success depends on two things: automated i...
MongoDB, an open-source document store and most popular NoSQL database on the market today, offers a variety of advanced features to administer security over your MongoDB deployments. In this tutorial post, we’re going to show you how to set up role-based access control (RBAC) to manage user access across your MongoDB systems for reIndex, mongodump and mongorestore. If you're the administrator of your MongoDB databases, you've likely received requests to provide an individual user with the capabilities to perform a certain action(s). MongoDB's security features are fairly mature now, and allo...
So data warehousing may not be cool anymore, you say? It’s yesterday’s technology (or 1990’s technology if you’re as old as me) that served yesterday’s business needs. And while it’s true that recent big data and data science technologies, architectures and methodologies seems to have rendered data warehousing to the back burner, it is entirely false that there is not a critical role for the data warehouse and Business Intelligence in digitally transformed organizations.
identify the sources of event storms and performance anomalies will require automated, real-time root-cause analysis. I think Enterprise Management Associates said it well: “The data and metrics collected at instrumentation points across the application ecosystem are essential to performance monitoring and root cause analysis. However, analytics capable of transforming data and metrics into an application-focused report or dashboards are what separates actual application monitoring from relatively simple silo monitoring.
Many enterprise and government IT organizations are realizing the benefits of cloud computing by extending IT delivery and management processes across private and public cloud services. But they are often challenged with balancing the need for centralized cloud governance without stifling user-driven innovation. This strategy requires an approach that fundamentally reshapes how IT is delivered today, shifting the focus from infrastructure to services aggregation, and mixing and matching the best services for meeting organizations’ current and future needs.
Quick quiz! What’s the first thing that comes to mind when you hear the following phrases? Artificial grass Artificial sweeteners Artificial flavors Artificial plants
Java 9 ships with some minor—yet awesome—new language features that make developing easier and cleaner. In this post, we’ll take a look at three of these new features. You probably remember interface methods, which were introduced in Java 8. These are required so that Java itself, as well as framework vendors, can add new methods to interfaces without breaking pre-existing implementations. As these methods can become rather complex, Java now enables you to declare interface methods as private. This allows for extracting common code from interface methods while hiding the code from external us...
How much does it cost to make an app is almost as popular a question as it is confusing. No one tries to learn the exact costs of, say, making a movie: people realize that there’s an overwhelming amount of variables involved on which they depend. But almost every day a new inquiry is posted on a tech forum, Quora, or Reddit as to how much it’d take to build a mobile business app.
Digital experience monitoring plays a vital role in the ecommerce economy. The industry is booming with millions of websites selling everything imaginable. Online stores are expected to be super fast and easy to navigate; users are quick to assess website performance and if said perceived performance is below expectations, they will quickly move on to competitor’s website.
"This all sounds great. But it's just not realistic." This is what a group of five senior IT executives told me during a workshop I held not long ago. We were working through an exercise on the organizational characteristics necessary to successfully execute a digital transformation, and the group was doing their ‘readout.' The executives loved everything we discussed and agreed that if such an environment existed, it would make transformation much easier. They just didn't believe it was realistic.

Artificial intelligence, virtual reality, software-defined networking, Hyperconverged Infrastructure, the cloud. These are all technological advancements intended to improve how IT systems and operations work, to give the business better agility and reduced costs, and ultimately to give end-users a new and better experience.  Quite often, however, IT’s creators and consumers alike lose sight of the […]

The post Consider the Human Side of IT appeared first on Dec. 10, 2017 11:00 AM EST  Reads: 1,291

Today’s hyper-connectivity of both people and things has led to an enormous jump in network traffic. Global IP traffic will increase nearly threefold over the next five years. It’s not going to lessen, nor is it going to get slower. These factors create a need for high-speed networks to ensure service level and capacity. 100G network links are deployed by telecom networks and data centers, serving hundreds of thousands of users, so that these providers can keep pace with customer demand. This then creates the need to test and troubleshoot on the networks at 100G link speed.
These days, no matter what task you’re trying to accomplish within your online properties, chances are there’s at least one cloud solution that provides it. However, with so much of our personal and business data living now online, there’s perhaps no functionality more important than cloud security. With cyber attacks more prevalent than ever, it’s imperative that organizations – regardless of their size and scope – protect both themselves and their clients from nefarious individuals who prey on unsecured networks and data.
Organizations around the world are struggling to cope with the current data explosion. A vital characteristic of this data is that it is unstructured and represents things like email, images, and videos. Storage of this form of data is typically in an object format which differs significantly from the database norm. Databases housed data grows very slowly because most of it is structured. Object storage formats are now being used to optimize access to large amounts of non-transactional files across a growing number of vertical markets.
The rule of thumb for network security today is that there is no perimeter anymore. An outsider can easily become an insider once perimeter security is breached. Every day, attackers find new ways to breach enterprise perimeter security through ransomware, malware or phishing through social engineering. This is not to suggest that all is lost. Rather, organizations can defeat cybercriminals, in part, by better managing what has already been put in place. As an example of what can go wrong if that doesn’t happen, consider the following story.
The benefits of automation are well documented; it increases productivity, cuts cost and minimizes errors. It eliminates repetitive manual tasks, freeing us up to be more innovative. By that logic, surely, we should automate everything possible, right? So, is attempting to automate everything a sensible - even feasible - goal? In a word: no. Consider this your short guide as to what to automate and what not to automate.
One problem that all developers and companies struggle with is trying to decide if they should "build it" or "buy it". Software developers love to build things. That is what we do! Their natural reaction tends to lean towards building things. We are also always up for a new challenge. There are very good reasons for building or buying software. There are also good reasons to use open source projects, which is a third option.
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, provided a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to operationalize the intelligence and how to implement a strategy to scale efforts. She pulled from her ex...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
The cloud revolution in enterprises has very clearly crossed the phase of proof-of-concepts into a truly mainstream adoption. One of most popular enterprise-wide initiatives currently going on are “cloud migration” programs of some kind or another. Finding business value for these programs is not hard to fathom – they include hyperelasticity in infrastructure consumption, subscription based models, and agility derived from rapid speed of deployment of applications. These factors will continue to drive cloud adoption into the foreseeable future.