|By Marketwired .||
|April 8, 2014 12:01 AM EDT||
RYE BROOK, NY -- (Marketwired) -- 04/08/14 -- ImageWare Systems, Inc. (OTCQB: IWSY) and StrikeForce Technologies, Inc. (OTCBB: SFORD)
Ms. Jody Ross, Vice President of Business Development, AMAG Technology, told us, "AMAG's Symmetry access control system is the best software on the market today. Our software and hardware come packed with features that other manufacturers charge for. The GUI is similar to Microsoft's so it's familiar to everyone, reducing training time, and it integrates to a wide variety of technology partners to provide video, audio, HR, etc. options to customers who need those options. Innovative features such as Alarm Workflow, Task Manager and Threat Level Manager allow security directors to better manage their security team's response times and actions, and secure their building during crisis situations. Symmetry is a leading-edge security system designed for buildings of any kind, which combines all aspects of security into a single well-designed and future-proof software solution suitable for small, large or very large applications."
For the complete interview with Jody Ross: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_JodyRoss.html
For more information www.AMAG.com and please see the following links:
About AMAG: http://www.amag.com/About-AMAG-Technology.aspx
AMAG Products: http://www.amag.com/Products.aspx
AMAG Solutions: http://www.amag.com/solutions.aspx
AMAG Services & Support: http://www.amag.com/Support.aspx
AMAG Partners: http://www.amag.com/area-of-interest.aspx
AMAG Case Studies: http://www.amag.com/Case-Studies.aspx
AMAG Resources: http://www.amag.com/library.aspx
AMAG News: http://www.amag.com/library/News.aspx
HP Enterprise Services
Mr. John Felker, Director, Cyber and Intelligence Strategy, HP Enterprise Services, U.S. Public Sector, told us, "HP takes an enterprise view of security which, in turn, helps our clients overcome the limitations typically associated with historical and siloed views of risk mitigation, globalized security and cost reductions. With the increased deployment of digital technologies, frequently operated remotely and unmanned, comes the need for increased cyber- and physical security for critical assets such as SCADA systems. At HP, we don't simply improve your security posture to address threats and manage risk and compliance, we also bring to bear an array of services, solutions and industry-leading technology to ensure you maintain a proactive, mature and agile security posture designed to navigate through ever-evolving threat and regulatory landscapes. By leveraging cloud, big data and mobility initiatives, you can evolve into a more proactive operating model which will increase productivity, optimize resource utilization and help you build and maintain safe, secure and environmentally sound operations."
For the complete interview with John Felker: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_HP_JohnFelker.html
For more information on these topics:
Risk Management and Compliance for US Public Sector
Cybersecurity for U.S. Public Sector (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1087497)
Public Sector Services and Solutions (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1131347)
ImageWare Systems, Inc. (OTCQB: IWSY) (ImageWare), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, has issued financial results for the fourth quarter and full year ended December 31, 2013, as well as provided a corporate update to highlight the company's progress since its last update on November 14, 2013.
Key Milestones and Events
- Initiated a pilot with T-Systems, a wholly owned subsidiary of one of the world's leading integrated telecommunications companies, Deutsche Telekom AG. The partnership will start with a pilot in T-Systems' labs in Germany to integrate ImageWare's patented, multi-modal biometric, cloud-based identity management and credential technology into T-Systems' products.
- Completed delivery of ImageWare's QuickCapture application in connection with a U.S. federally sponsored pilot program for iris recognition with 20 state and local law enforcement agencies.
- Recognized as 2014 Innovation and Design Award Winner for its Biometric Engine 2.0® by industry research firm Envisioneering at the Mobile World Congress in Barcelona, Spain.
- Settled patent litigation with WCC Services US (WCC) and Creative Information Technology (CITI) that resulted in WCC and CITI obtaining royalty bearing licenses from IWSY for the patents at issue. These patents cover IWSY's multi-modal biometric platform and fusion of biometric modalities.
Fourth Quarter and Full Year 2013 Financial Results
Total revenues in the fourth quarter of 2013 increased to $929,000 from $926,000 in the fourth quarter of 2012. Total revenues for the full year of 2013 increased 135% to $5.3 million from $4.0 million in 2012, with the increase primarily due to approximately $1.5 million received in August for software licenses in connection with a $2.2 million contract with the U.S. Department of Veteran Affairs.
Gross margin in the fourth quarter of 2013 increased 160 basis points to 72.4% compared to 70.8% in the fourth quarter of 2012, with the increase primarily due to reduced costs from the relocation of certain technical support functions from the company's Canadian office to its San Diego office. Gross margin for the full year of 2013 increased to 79.4% from 69.6% in 2012, with the increase primarily due to higher software license revenues and, to a lesser extent, savings from the aforementioned relocation of technical support functions.
Net loss in the fourth quarter of 2013 was $1.8 million, or ($0.02) per diluted share, compared to net income of $62,000, or $0.00 per diluted share, in the fourth quarter of 2012. Net income in the fourth quarter of 2012 included a $1.8 million gain from the change in fair value of derivative liabilities. Net loss in the full year of 2013 was $9.9 million, or ($0.12) per diluted share, compared to a net loss of $10.2 million, or ($0.14) per diluted share, in 2012. Net loss in 2013 included a $4.8 million loss from the change in fair value of derivative liabilities, while net loss in 2012 included a $ $4.7 million loss from the change in fair value of derivative liabilities.
At December 31, 2013, cash and cash equivalents totaled $2.4 million compared to $4.2 million at December 31, 2012. The company continues to carry virtually no debt and, subsequent to the end of the quarter, increased their line of credit from $2.5 million to $3.5 million.
"2013 was a pivotal year for ImageWare, as we formed partnerships with two of the world's largest IT services providers, Fujitsu and T-Systems," said Jim Miller, chairman and CEO of ImageWare. "We are starting to see a shift in companies evangelizing biometrics, moving from the small biometric companies trying to prove their practical application in the commercial and consumer markets, to many large corporations understanding the real-world benefits of bringing biometrics to the mainstream public. This shift has created an attractive opportunity for ImageWare and we plan to leverage our large partners' sales and marketing power to capitalize on it.
"Our new partnership and close collaboration with T-Systems represents the outcome of a number of months of discussion and planning. We're now taking the next step by integrating our technology into their products and expect this new relationship to expand our presence throughout European and worldwide markets.
"These and other proactive steps we've taken to position ImageWare as a leader in multi-modal biometric security are beginning to attract broader attention. We recently attended the Mobile World Congress in Barcelona where the reception we received was incredible, particularly for our patented PillPhone®, which is the first and only FDA-approved biometric-enabled enterprise mobile application."
Miller concluded: "Working closely with our technology partners, we continue to build a healthy pipeline of potential customers and are currently in discussions with several clients regarding licensing opportunities. We will continue to target large enterprise businesses and emerging applications and believe the steps we are taking to advance our cloud, SaaS and mobile offerings in the commercial and consumer marketplace will continue to build shareholder value, along with greater visibility that includes a healthy recurring revenue stream."
For more information, please click here.
For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here (http://www.securitystockwatch.com/Interviews/in_Boardroom_ImageWare.html)
For more information:
IWS CloudID: http://iwsinc.com/products/next-generation-iws-cloudid-product-suite/
ImageWare Systems Solutions: http://www.iwsinc.com/markets/overview
ImageWare Systems Products: http://www.iwsinc.com/products/overview2
For ImageWare Systems Investors: http://www.iwsinc.com/about-iws/investors/overview1
For more information: www.iwsinc.com
Recently announced that...
And, in other recent news...March Networks announced that...
For More Information About March Networks Solutions:
March Networks Financial Solutions (www.marchnetworks.com/solutions/financial/default.aspx)
March Networks Retail Solutions (www.marchnetworks.com/solutions/retail/default.aspx)
March Network Airports-Seaports Solutions (http://www.marchnetworks.com/solutions/airports-seaports/default.aspx)
March Network Commercial-Industrial Solutions (http://www.marchnetworks.com/solutions/commercial-industrial/default.aspx)
March Networks Critical Infrastructure Solutions (http://www.marchnetworks.com/solutions/critical-infrastructure/default.aspx)
March Networks Government Solutions (http://www.marchnetworks.com/solutions/government/default.aspx)
And, For More Information:
About March Networks (www.marchnetworks.com/company/about-us/)
What's New At March Networks (www.marchnetworks.com/products/whats-new.aspx)
March Networks Blog (http://www.marchnetworks.com/intelligent-ip-video-blog/)
For the latest March Networks News (www.marchnetworks.com/company/news-center/2013/9/24/497)
StrikeForce Technologies, Inc., a company that specializes in Cyber Security solutions for the prevention of Data Breaches and Cyber Theft, recently announced it has received an official Notice of Allowance from the United States Patent Office stating that a second patent application titled "Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser" has been approved for issuance.
"We are extremely excited about receiving this Notice of Allowance for our Keystroke Encryption technology," says Mark L. Kay, CEO of StrikeForce, "it has game changing implications for our Company and the industry. This expands on our original patent and includes: all computers, smart phones, tablets, and all the keystrokes you enter. Our patented Keystroke Encryption technology proactively encrypts each and every keystroke typed on a keyboard. All security experts agree that the use of encryption is the best way to protect data on your mobile device," continues Kay. "Until we developed our Keystroke Encryption Technology for mobile devices, there wasn't any way to encrypt data in motion at the point of origin, when typed on a mobile device keyboard."
"Additionally, as announced two weeks ago on March 11th, StrikeForce has received an official Notice of Allowance from the US Patent and Trademark Office that we have been approved for Issuance of our third patent for Out-of-Band Authentication," says Kay. "Our patent portfolio continues to increase. After these two Notices become patents, StrikeForce will then own five patents in our portfolio, and there will still be three more pending. Owning the patents for Keystroke Encryption and Out-of-Band Authentication positions us on the forefront of what is hot in security and regulatory requirements today, as seen through our new contracts and increasing pipeline. As we learned at the recent RSA Security Show, these are the types of product purchasesnow being included in security budgets. Our increasing patent portfolio also improves our value as we continue to protect our intellectual property assets."
The timing of this Notice of Allowance coincides perfectly with StrikeForce's recently announced two new mobile products (MobileTrust® and GuardedID® Mobile SDK). Both products already include our patented keystroke encryption technology and should be available within the next thirty to sixty days. Individuals and Corporations will now for the first time, be able to protect themselves with our MobileTrust application, while mobile application developers will be able to build our one-of-a-kind Keystroke Encryption technology directly into their mobile applications.
"Keystroke Encryption is an extremely critical security technology, which plays a major role in preventing the most widespread malware from stealing confidential data from mobile devices," says Kay.
In other recent news, StrikeForce Technologies, Inc. announced today that Blank Rome LLP, a top 100 law firm has licensed StrikeForce's ProtectID Outof-Band Two-Factor Authentication Platform to protect remote access and their clients Intellectual Property.
"We were extremely pleased that Blank Rome has chosen to deploy our ProtectID Out-of-Band Two-Factor Authentication Platform," says Mark L. Kay, CEO of StrikeForce, "Blank Rome has been in business for more than sixty five years and is amongst the most prestigious Law Firms. They realize the importance of protecting network access and the intellectual property of their customers."
"As part of our effort to continue improving the Firm's overall security posture, Blank Rome decided to employ two-factor authentication to bolster the security of remote access to the Firm's network. After being introduced to StrikeForce Technologies' solution, we liked their approach to out-of-band authentication. We knew anything we implemented for this purpose had to be easy to use, as well as being secure and flexible. StrikeForce's system achieves this simplicity and flexibility by supporting a variety of methods to input the second factor, and it also is economical and easy to implement," says Laurence Liss, CTO of Blank Rome.
"For a long time now, law firms have worked under the implicit assumption that they were not targets of hackers. Law firms thought of themselves as above the rough and tumble world of spying and IP theft. However, all of that has changed," says Kay. "Law enforcement agencies throughout the world have warned of an increasing threat of hacking to law firms. These concerns have escalated to such an extent that the White House, the Attorney General and the FBI are publicly warning law firms to tackle the escalating risk of cyber attacks."
"Working with law firms to protect their remote access and intellectual property is now high on our radar, just within two months we helped Superior Discovery with similar concerns as they service many prominent law firms," says Kay.
For more information about:
www.strikeforcetech.com; (OTCBB: SFORD)
SYS-CON Events Announces Cloud Expo 2014 New York
14th International Cloud Expo to take place June 10-12, 2014, at the Javits Center in New York City
SYS-CON Events announced today that 14th Cloud Expo®, co-located with 5th Big Data Expo, 3rd SDDC Expo, 2nd DevOps Summit, 2nd WebRTC Summit, and 1st Things Expo, will take place June 10-12, 2014, at the Javits Center in New York City.
The three-day event will offer a vast selection of technical and strategic breakout sessions, General Sessions, Industry Keynotes, and "Power Panels" from a rock star conference faculty chosen from among the leading industry players in the cloud computing and Big Data worlds. The bustling Expo Floor will include two busy Demo Theaters so that as a delegate you can kick the tires of solutions and offerings, and discuss one-on-one with all the leading Cloud and Big Data players what they are offering and how to make use of it in your particular situation.
All the main layers of the Cloud ecosystem will be represented -- the infrastructure players, the platform providers, and those offering applications. The high-energy event is a must-attend for senior technologists from CEOs on down -- including CIOs, CTOs, directors of infrastructure, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, and communications and networking specialists.
For 37 years FOSE has served as the nation's premier event for government technology professionals seeking tools and best practices to equip their agency for the 21st century. From policy updates -- straight from the Hill -- and exclusive insights from today's leading authorities, to the most comprehensive showcase of technology in action -- it's all at FOSE.
FOSE's three-day conference addresses the most relevant and pressing technology and management priorities and issues for government and its private sector partners. With more than 60 sessions including keynotes, panel discussions and in-depth technical sessions, you can expect to take home best practices, policy updates and detailed guidance across 8 in-demand tracks.
GovSec 2014 Conference & Free Expo
Experience the Largest, Most Dynamic Government Security Expo in Washington, DC, May 13-14, FREE. Discover the newest trends, cutting-edge technology, tools, equipment and the exciting companies who provide them in the exhibit hall.
Plus, get valuable training to enhance your career without straining your budget at the full conference -- with conference prices starting at $99, you won't want to miss out!
GovSec resource trusted by thousands of security professionals and is the nation's premier event for government, homeland security, and law enforcement!
Get more information and register for the full conference or free expo today -- SecuritySolutionsWatch.com Readers save 10% on conference prices! Use code: PMG02 @ www.GovSecInfo.com.
June 17-19, 2014
If you're looking focused content, features and leading suppliers catering for every security requirement, IFSEC International in London is the only destination for you this June! With a global focus on expertise and guidance, you'll discover high level security content that covers both public and private security, from SMEs to the largest enterprises. An international gathering of over 28,000 professionals, the event is the key forum in which to meet with the manufacturers leading the way in security innovation, including Axis, Samsung, ASSA Abloy, Canon and many more.
If you're a trade visitor, take the opportunity to network with the potential clients with live projects, while sourcing your full range of kit on the show floor. If you're an end user, attend to meet the installers, integrators and consultants who can steer you towards an increasingly successful security strategy.
Register free of charge at www.ifsec.co.uk/register
For more information about:
IFSEC Community: http://www.ifsecglobal.com/
IFSEC Directory: http://directory.ifsecglobal.com/
IFSEC Events: http://www.ifsecglobal.com/events/
InfoSec World Conference & Expo 2014
April 7-9, 2014
Disney's Contemporary Resort
The event features 70+ sessions, dozens of case studies, 8 tracks (including a Hands-On Track), 11 in-depth workshops, 3 co-located summits and an exhibit hall showcasing the industry's leading vendors. With the primary objective of providing top-notch education to all levels of information security and IT auditing professionals, InfoSec World delivers practical sessions that give you the tools to strengthen your security without restricting your business!
29th April - 01st May 2014
Network, engage and do business with +15,000 other information security professionals at 19th Infosecurity Europe 29th April - 01st May 2014
Infosecurity Europe is the largest and most attended information security event in Europe. Held in London, it is a free exhibition featuring over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme attracting visitors from every segment of the industry.
Collect CPD/CPE Credits
The Education Programme is shaped by the industry for the industry. Addressing the latest challenges and industry needs it will provide you with business critical insight, best practice and practical case studies. Speakers include information security thought-leaders from public and private sector end-users, policy-makers and government, analysts, industry experts, service providers and vendors.
Featuring five conference and seminar theatres and a comprehensive programme of workshops and training courses, attending the Infosecurity Europe Education Programme helps you to further develop your career and learning.
Meet with the key industry players
From the New Exhibitor zone to the Country Pavilions, discover the latest products and solutions of the local and international scene. This is your best opportunity to receiving expert advice and to discuss your needs with key information security players.
Infosecurity Europe is the most important date in the calendar for information security professionals across Europe. The attendees reflect every segment of the information security industry coming from key sectors including:
- IT distribution companies
- IT hardware, software, manufacturers and suppliers
- End-user information security professionals
- Government professionals
For more information and to register please visit http://www.infosec.co.uk/visiting/
LinuxCon North America
August 20-22, 2014
LinuxCon is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.
Congress Centre Düsseldorf
October 13 - 15, 2014
LinuxCon Europe is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.
PSA Security Network
Mr. Bill Bozeman, CPP, CHS, President/CEO, told us, "... the TEC event will be May 5-9 in Colorado. TEC stands for Training, Exhibits and Conference. For this yearly event, which is open to the entire security industry, we took all the best parts of your typical security event and brought them together under one roof, and for one low price. At TEC you will get the training and education you need for your entire company with hundreds of hours of courses to choose from. We also offer physical security certifications, where you will get the opportunity to learn from the leading minds in the industry, and explore new and innovative ideas with your peers.
The full day exhibit hall is where attendees can see the latest products and service offerings from over 100 of the security industry's top manufacturers. Explore state-of-the-art technologies and cutting-edge business solutions that will prepare your company for success. And finally, the Conference portion of TEC. This is where you will become a part of the industry's best networking opportunities by engaging with your peers and technology leaders in a fast-paced, lively environment. For the complete interview with Bill Bozeman: www.securitysolutionswatch.com/Interviews/in_Boardroom_PSA.html.
For more information: www.buyPSA.com
Read the PSA Blog: http://blog.buypsa.com/blog
Locate A PSA Integrator: http://www.buypsa.com/Integrators
PSA Vendor Partners: http://www.buypsa.com/Vendors
PSA Education: http://www.buypsa.com/Education
RFID Journal LIVE! 2014
Apr. 8-10, 2014 -- Orlando, Fla.
Learn how to track and manage everything at the world's largest RFID event, RFID Journal LIVE! 2014. RFID technologies are advancing rapidly and adoption is accelerating. Learn how your company can benefit at the only RFID event featuring more than 75 hours of education, more than 50 end-user case studies and more than 200 technology companies. Hear how industry leaders are benefitting from RFID in the defense, aerospace, health-care, pharmaceuticals, manufacturing, retail and apparel industries. See live demonstrations of the latest solutions and learn how to deploy the technology successfully.
Register now-SecuritySolutionsWatch.com VIP Discount: Save 15% with promo code EADW.
SDW 2014 - Exhibition sold out and exceeding all expectations
With still more than 4 months to go to SDW 2014, the SDW Exhibition has completely sold out, beating all previous records for the event. Some 103 companies have signed up to participate at the world's leading event for next-generation human identity and secure credential solutions, and a waiting list is in operation.
A full list of exhibiting companies can be viewed at: http://www.sdw2014.com/exhibitors/
Entry to the exhibition is free to registered visitors, and all visitors pre-registering before 9th May 2014 will be upgraded to Visitor Plus+ status and be entered into the SDW Conference Delegate draw with the chance of winning a free delegate pass to SDW 2014. In addition, they will receive a complimentary £ 5.00 catering voucher to use at the show.
Pre-registration can be completed at: http://www.sdw2014.com/visitor-registration
Delegates from government departments in Asia, Africa and Latin America can access the entire three day event, including the conference and exhibition for just £ 399 +VAT. Government attendees from other world regions can register for £ 499 +VAT (Rate expires 28th February 2014.) Plus, for multiple registrations for every government delegate registered, the second is at half price.
In addition, for 2014, all conference sessions will have simultaneous translation into French and Spanish.
Industry delegates are also able to attend the SDW 2014 conference at a discounted rate. The show operates a limited-availability, stepped pricing policy, meaning that delegates who book early access the lowest rates. Delegates can register online at: http://www.sdw2014.com/delegate-booking
Diary Date - SDW 2014, 16-18 June 2014, Queen Elizabeth II Conference Centre, London, UK
Security Industry Association (SIA)
Register for the 2014 SIA Government Summit
Registration is now open for the 2014 SIA Government Summit, hosted by the Security Association (SIA) June 3-4, 2014, at the W Hotel in Washington, D.C.
SIA Members can register for $550; nonmembers for $775 through May 4.Registration includes breakfast and lunch both days as well as the semi-formal SIA Public Policy Dinner, where SIA recognizes leading legislators and outstanding SIA volunteers.
The Summit provides attendees with unparalleled policy insights that help create new market opportunities. The exclusive nature of the setting allows one-on-one conversations with government decision makers about legislation and regulations important to the security industry.
Questions about the SIA Government Summit? Contact Elizabeth Hunger at 301-804-4714 or [email protected].
SIA Unveils New Certification Exam
At ISC West in Las Vegas on April 4, the Security Industry Association (SIA) unveiled revised exam for its Certified Security Project Manager (CSPM®) certification program.
SIA will present the refreshed CSPM® Review Course and later this year. The 2.5-day, instructor-led training is offered to SIA Members for $995 and $1,295 for nonmembers. Contact Kimberly Roberts at 301-804-4708 or [email protected] for more information.
CSPM® Review Course Schedule:
May 5-7, in Westminster, Colo. (to be delivered at 2014 PSA-TEC, costs may vary)
June 10-12, in Pomona, Calif.
Aug. 4-6, in Silver Spring, Md.
Oct. 1-3, in Atlanta, Ga.
The CSPM® Review Course goes beyond foundational principles and offers newer and seasoned project managers clear perspective on the importance of their role to stakeholders and identifies risks that could hinder project success. Attendees receive the SIA Security Project Manager's Common Body of Knowledge Guidebook, which includes a compendium of resources, checklists, templates and other materials to help prepare for success on future projects.
By using our website and any information located at www.SecuritySolutionsWatch.com you agree to these "Terms."
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at Logz.io, explored the value of Kibana 4 for log analysis and provided a hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He examined three use cases: IT operations, business intelligence, and security and compliance. Asaf Yigal is co-founder and VP of Product at log analytics software company Logz.io. In the past, he was co-founder of social-trading platform Currensee, which was later acquired by OANDA. He was also an early employee of server performance-monitoring company...
Nov. 28, 2015 12:00 PM EST Reads: 229
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound cha...
Nov. 28, 2015 12:00 PM EST Reads: 548
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, rich desktop and tuned mobile experiences can now be created with a single codebase – without compromising functionality, performance or usability. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, demonstrated examples of com...
Nov. 28, 2015 11:45 AM EST Reads: 401
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ability. Many are unable to effectively engage and inspire, creating forward momentum in the direction...
Nov. 28, 2015 10:00 AM EST Reads: 396
Continuous processes around the development and deployment of applications are both impacted by -- and a benefit to -- the Internet of Things trend. To help better understand the relationship between DevOps and a plethora of new end-devices and data please welcome Gary Gruver, consultant, author and a former IT executive who has led many large-scale IT transformation projects, and John Jeremiah, Technology Evangelist at Hewlett Packard Enterprise (HPE), on Twitter at @j_jeremiah. The discussion is moderated by me, Dana Gardner, Principal Analyst at Interarbor Solutions.
Nov. 28, 2015 05:30 AM EST Reads: 731
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true change and transformation possible.
Nov. 28, 2015 04:00 AM EST Reads: 541
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" in this scenario: microservice A (releases daily) depends on a couple of additions to backend B (re...
Nov. 28, 2015 03:00 AM EST Reads: 451
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at Built.io, examined how Docker has evolved into a highly effective tool for application delivery by allowing increasingly popular Mobile Backend-as-a-Service (mBaaS) platforms to quickly crea...
Nov. 28, 2015 02:00 AM EST Reads: 361
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Carter, IBM General Manager Cloud Ecosystem and Developers, and a Social Business Evangelist, wil...
Nov. 28, 2015 02:00 AM EST Reads: 580
Internet of @ThingsExpo, taking place June 7-9, 2016 at Javits Center, New York City and Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 18th International @CloudExpo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo New York Call for Papers is now open.
Nov. 27, 2015 12:00 PM EST Reads: 553
There are over 120 breakout sessions in all, with Keynotes, General Sessions, and Power Panels adding to three days of incredibly rich presentations and content. Join @ThingsExpo conference chair Roger Strukhoff (@IoT2040), June 7-9, 2016 in New York City, for three days of intense 'Internet of Things' discussion and focus, including Big Data's indespensable role in IoT, Smart Grids and Industrial Internet of Things, Wearables and Consumer IoT, as well as (new) IoT's use in Vertical Markets.
Nov. 25, 2015 12:00 PM EST Reads: 548
After more than five years of DevOps, definitions are evolving, boundaries are expanding, ‘unicorns’ are no longer rare, enterprises are on board, and pundits are moving on. Can we now look at an evolution of DevOps? Should we? Is the foundation of DevOps ‘done’, or is there still too much left to do? What is mature, and what is still missing? What does the next 5 years of DevOps look like? In this Power Panel at DevOps Summit, moderated by DevOps Summit Conference Chair Andi Mann, panelists looked back at what DevOps has become, and forward at what it might create next.
Nov. 20, 2015 05:00 PM EST Reads: 381
SYS-CON Events announced today that TechTarget has been named “Media Sponsor” of SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget storage websites are the best online information resource for news, tips and expert advice for the storage, backup and disaster recovery markets.
Nov. 5, 2015 10:00 AM EST Reads: 572
SYS-CON Events announced today that O'Reilly Media has been named “Media Sponsor” of SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. O'Reilly spreads the knowledge of innovators through its technology books, online services, research, and tech conferences. An active participant in the technology community, O'Reilly has a long history of advocacy, meme-making, and evangelism.
Nov. 5, 2015 09:45 AM EST Reads: 536
Docker is hot. However, as Docker container use spreads into more mature production pipelines, there can be issues about control of Docker images to ensure they are production-ready. Is a promotion-based model appropriate to control and track the flow of Docker images from development to production? In his session at DevOps Summit, Fred Simon, Co-founder and Chief Architect of JFrog, will demonstrate how to implement a promotion model for Docker images using a binary repository, and then show how to distribute them to any kind of consumer, being it a customer or a data center.
Nov. 3, 2015 10:00 AM EST Reads: 722
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace.
Nov. 3, 2015 09:00 AM EST Reads: 509
Webair, a leading provider of Cloud Hosting, Colocation and Managed solutions, today announces that its Chief Technology Officer, Sagi Brody, will speak at Cloud Expo 2015 Silicon Valley, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, California. Cloud Expo 2015 Silicon Valley is a world-class conference that brings together thought-leaders and cutting edge practitioners in the cloud / utility computing, Big Data, Internet of Things (IoT), Software-Defined Data Center (SDDC), DevOps and Web Real-Time Communication (WebRTC) space, which, in addition to prest...
Nov. 3, 2015 06:00 AM EST Reads: 499
DevOps is a software development method that places emphasis on communications between Software Engineering, Quality Assurance and IT Operations (SEQAITO ) with the goal to produce software and services to improve, increase the operational performance for the Enterprise. Communications is key not only between the SEQAITO team members but also the communication between the applications and the SEQAITO team. How can an organization provide the human communication and the application communication to the SEQAITO team to ensure the successful development, deployment of the application?
Nov. 3, 2015 05:00 AM EST Reads: 467
Logz.io, the Predictive ELK (Elasticsearch, Logstash and Kibana) log analytics cloud service company, announced today that it was chosen to speak at DevOps Summit, which will take place on November 3-5 in Santa Clara, California. Logz.io will explore the entire process that we have undergone – through research, benchmarking, implementation, optimization, and customer success – in developing a processing engine that can handle petabytes of data. We will also discuss the requirements of such an engine in terms of scalability, resilience, security, and availability along with how the architectur...
Nov. 3, 2015 12:45 AM EST Reads: 422
Automating AWS environments is important for all businesses as it simplifies creation and setup of cloud resources, facilitates otherwise complex processes, and streamlines management. The benefits of automation are clear: accelerate execution, reduce human error and unwanted consequences, and increase the enterprise’s ability to rapidly adapt, all while reducing the overall cost of IT operations. In his session at 17th Cloud Expo, Patrick McClory, Director of Automation and DevOps at Datapipe, dives deep into the technical specifics of automation for AWS including a discussion of best pract...
Nov. 2, 2015 06:00 PM EST Reads: 657
Father business cycles and digital consumers are forcing enterprises to respond faster to customer needs and competitive demands. Successful integration of DevOps and Agile development will be key for business success in today’s digital economy. In his session at DevOps Summit, Pradeep Prabhu, Co-Founder & CEO of Cloudmunch, he will cover the critical practices that enterprises should consider to seamlessly integrate Agile and DevOps processes, barriers to implementing this in the enterprise, and provide examples on how an integrated approach has helped major companies embrace a cloud first,...
Nov. 2, 2015 06:00 PM EST Reads: 676
In a recent research, Analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
Nov. 2, 2015 04:00 PM EST Reads: 509
Join IBM Bluemix on November 4 at 17th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how to jump start your IoT strategy with MobileFirst, cloud and cognitive computing. Transform everyday MobileFirst Cloud Apps into IoT solutions in 2.5 seconds! What happens when you combine a SmartPhone, a watch and a sassy robot with one MobileFirst Application? What happens when Watson does it - on Cloud!?! Join this session to see IOT in action! There are over nine billion Internet of Things devices in the world today, and the number is growing. Move your MobileFirst Appde...
Nov. 2, 2015 03:00 PM EST Reads: 689
In their session at DevOps Summit, Asaf Yigal, co-founder and the VP of Product at Logz.io, and Tomer Levy, co-founder and CEO of Logz.io, will explore the entire process that they have undergone – through research, benchmarking, implementation, optimization, and customer success – in developing a processing engine that can handle petabytes of data. They will also discuss the requirements of such an engine in terms of scalability, resilience, security, and availability along with how the architecture accomplishes these requirements. Lastly, they will review the gory details of the technolo...
Nov. 2, 2015 03:00 PM EST Reads: 644
Most everyone in Cloud IT circles has realized the power of containerization and that companies are adopting Docker containers at a remarkable rate. There are many good reasons for this, such as easily setting up dev/test scenarios (DevOps), and building out sophisticated, distributed computing clusters. But there are some deeper questions this talk will address from the Microsoft perspective. For example, what is the future of Windows in a containerized world? How will Windows and Linux work together in Azure?
Nov. 2, 2015 03:00 PM EST Reads: 549