Click here to close now.


@DevOpsSummit Authors: Liz McMillan, AppDynamics Blog, Elizabeth White, XebiaLabs Blog, Wayne Ariola

News Feed Item

Security Solutions Discussed by Industry Leaders in Interviews With AMAG, HP, ImageWare Systems, March Networks and StrikeForce

RYE BROOK, NY -- (Marketwired) -- 04/08/14 -- ImageWare Systems, Inc. (OTCQB: IWSY) and StrikeForce Technologies, Inc. (OTCBB: SFORD)


AMAG Technology

Ms. Jody Ross, Vice President of Business Development, AMAG Technology, told us, "AMAG's Symmetry access control system is the best software on the market today. Our software and hardware come packed with features that other manufacturers charge for. The GUI is similar to Microsoft's so it's familiar to everyone, reducing training time, and it integrates to a wide variety of technology partners to provide video, audio, HR, etc. options to customers who need those options. Innovative features such as Alarm Workflow, Task Manager and Threat Level Manager allow security directors to better manage their security team's response times and actions, and secure their building during crisis situations. Symmetry is a leading-edge security system designed for buildings of any kind, which combines all aspects of security into a single well-designed and future-proof software solution suitable for small, large or very large applications."

For the complete interview with Jody Ross:

For more information and please see the following links:
About AMAG:
AMAG Products:
AMAG Solutions:
AMAG Services & Support:
AMAG Partners:
AMAG Case Studies:
AMAG Resources:
AMAG News:


HP Enterprise Services

Mr. John Felker, Director, Cyber and Intelligence Strategy, HP Enterprise Services, U.S. Public Sector, told us, "HP takes an enterprise view of security which, in turn, helps our clients overcome the limitations typically associated with historical and siloed views of risk mitigation, globalized security and cost reductions. With the increased deployment of digital technologies, frequently operated remotely and unmanned, comes the need for increased cyber- and physical security for critical assets such as SCADA systems. At HP, we don't simply improve your security posture to address threats and manage risk and compliance, we also bring to bear an array of services, solutions and industry-leading technology to ensure you maintain a proactive, mature and agile security posture designed to navigate through ever-evolving threat and regulatory landscapes. By leveraging cloud, big data and mobility initiatives, you can evolve into a more proactive operating model which will increase productivity, optimize resource utilization and help you build and maintain safe, secure and environmentally sound operations."

For the complete interview with John Felker:

For more information on these topics:
Risk Management and Compliance for US Public Sector
Cybersecurity for U.S. Public Sector (
Public Sector Services and Solutions (


ImageWare Systems

ImageWare Systems, Inc. (OTCQB: IWSY) (ImageWare), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, has issued financial results for the fourth quarter and full year ended December 31, 2013, as well as provided a corporate update to highlight the company's progress since its last update on November 14, 2013.

Key Milestones and Events

  • Initiated a pilot with T-Systems, a wholly owned subsidiary of one of the world's leading integrated telecommunications companies, Deutsche Telekom AG. The partnership will start with a pilot in T-Systems' labs in Germany to integrate ImageWare's patented, multi-modal biometric, cloud-based identity management and credential technology into T-Systems' products.
  • Completed delivery of ImageWare's QuickCapture application in connection with a U.S. federally sponsored pilot program for iris recognition with 20 state and local law enforcement agencies.
  • Recognized as 2014 Innovation and Design Award Winner for its Biometric Engine 2.0® by industry research firm Envisioneering at the Mobile World Congress in Barcelona, Spain.
  • Settled patent litigation with WCC Services US (WCC) and Creative Information Technology (CITI) that resulted in WCC and CITI obtaining royalty bearing licenses from IWSY for the patents at issue. These patents cover IWSY's multi-modal biometric platform and fusion of biometric modalities.

Fourth Quarter and Full Year 2013 Financial Results

Total revenues in the fourth quarter of 2013 increased to $929,000 from $926,000 in the fourth quarter of 2012. Total revenues for the full year of 2013 increased 135% to $5.3 million from $4.0 million in 2012, with the increase primarily due to approximately $1.5 million received in August for software licenses in connection with a $2.2 million contract with the U.S. Department of Veteran Affairs.

Gross margin in the fourth quarter of 2013 increased 160 basis points to 72.4% compared to 70.8% in the fourth quarter of 2012, with the increase primarily due to reduced costs from the relocation of certain technical support functions from the company's Canadian office to its San Diego office. Gross margin for the full year of 2013 increased to 79.4% from 69.6% in 2012, with the increase primarily due to higher software license revenues and, to a lesser extent, savings from the aforementioned relocation of technical support functions.

Net loss in the fourth quarter of 2013 was $1.8 million, or ($0.02) per diluted share, compared to net income of $62,000, or $0.00 per diluted share, in the fourth quarter of 2012. Net income in the fourth quarter of 2012 included a $1.8 million gain from the change in fair value of derivative liabilities. Net loss in the full year of 2013 was $9.9 million, or ($0.12) per diluted share, compared to a net loss of $10.2 million, or ($0.14) per diluted share, in 2012. Net loss in 2013 included a $4.8 million loss from the change in fair value of derivative liabilities, while net loss in 2012 included a $ $4.7 million loss from the change in fair value of derivative liabilities.

At December 31, 2013, cash and cash equivalents totaled $2.4 million compared to $4.2 million at December 31, 2012. The company continues to carry virtually no debt and, subsequent to the end of the quarter, increased their line of credit from $2.5 million to $3.5 million.

Management Commentary
"2013 was a pivotal year for ImageWare, as we formed partnerships with two of the world's largest IT services providers, Fujitsu and T-Systems," said Jim Miller, chairman and CEO of ImageWare. "We are starting to see a shift in companies evangelizing biometrics, moving from the small biometric companies trying to prove their practical application in the commercial and consumer markets, to many large corporations understanding the real-world benefits of bringing biometrics to the mainstream public. This shift has created an attractive opportunity for ImageWare and we plan to leverage our large partners' sales and marketing power to capitalize on it.

"Our new partnership and close collaboration with T-Systems represents the outcome of a number of months of discussion and planning. We're now taking the next step by integrating our technology into their products and expect this new relationship to expand our presence throughout European and worldwide markets.

"These and other proactive steps we've taken to position ImageWare as a leader in multi-modal biometric security are beginning to attract broader attention. We recently attended the Mobile World Congress in Barcelona where the reception we received was incredible, particularly for our patented PillPhone®, which is the first and only FDA-approved biometric-enabled enterprise mobile application."

Miller concluded: "Working closely with our technology partners, we continue to build a healthy pipeline of potential customers and are currently in discussions with several clients regarding licensing opportunities. We will continue to target large enterprise businesses and emerging applications and believe the steps we are taking to advance our cloud, SaaS and mobile offerings in the commercial and consumer marketplace will continue to build shareholder value, along with greater visibility that includes a healthy recurring revenue stream."

For more information, please click here.
For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here (

For more information:

IWS CloudID™:
ImageWare Systems Solutions:
ImageWare Systems Products:
For ImageWare Systems Investors:
For more information:


March Networks

Recently announced that...

Pelco IP Cameras Now Integrated with March Networks' Command Video Management System

March Networks and Software House Deliver Integrated Video Surveillance and Access Control Management


New March Networks Video Intelligence Software Delivers Enhanced Browser-Based Management and Investigation

And, in other recent news...March Networks announced that...

U.S. Wine and Spirits Superstore Chain Deploys March Networks Video Surveillance for Security and Fulfillment Protection

For the complete interview with Net Payne, March Networks, Chief Marketing Officer, please click here (

For More Information About March Networks Solutions:
March Networks Financial Solutions (
March Networks Retail Solutions (
March Network Airports-Seaports Solutions (
March Network Commercial-Industrial Solutions (
March Networks Critical Infrastructure Solutions (
March Networks Government Solutions (

And, For More Information:
About March Networks (
What's New At March Networks (
March Networks Blog (
For the latest March Networks News (


StrikeForce Technologies

StrikeForce Technologies, Inc., a company that specializes in Cyber Security solutions for the prevention of Data Breaches and Cyber Theft, recently announced it has received an official Notice of Allowance from the United States Patent Office stating that a second patent application titled "Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser" has been approved for issuance.

"We are extremely excited about receiving this Notice of Allowance for our Keystroke Encryption technology," says Mark L. Kay, CEO of StrikeForce, "it has game changing implications for our Company and the industry. This expands on our original patent and includes: all computers, smart phones, tablets, and all the keystrokes you enter. Our patented Keystroke Encryption technology proactively encrypts each and every keystroke typed on a keyboard. All security experts agree that the use of encryption is the best way to protect data on your mobile device," continues Kay. "Until we developed our Keystroke Encryption Technology for mobile devices, there wasn't any way to encrypt data in motion at the point of origin, when typed on a mobile device keyboard."

"Additionally, as announced two weeks ago on March 11th, StrikeForce has received an official Notice of Allowance from the US Patent and Trademark Office that we have been approved for Issuance of our third patent for Out-of-Band Authentication," says Kay. "Our patent portfolio continues to increase. After these two Notices become patents, StrikeForce will then own five patents in our portfolio, and there will still be three more pending. Owning the patents for Keystroke Encryption and Out-of-Band Authentication positions us on the forefront of what is hot in security and regulatory requirements today, as seen through our new contracts and increasing pipeline. As we learned at the recent RSA Security Show, these are the types of product purchasesnow being included in security budgets. Our increasing patent portfolio also improves our value as we continue to protect our intellectual property assets."

The timing of this Notice of Allowance coincides perfectly with StrikeForce's recently announced two new mobile products (MobileTrust® and GuardedID® Mobile SDK). Both products already include our patented keystroke encryption technology and should be available within the next thirty to sixty days. Individuals and Corporations will now for the first time, be able to protect themselves with our MobileTrust application, while mobile application developers will be able to build our one-of-a-kind Keystroke Encryption technology directly into their mobile applications.

"Keystroke Encryption is an extremely critical security technology, which plays a major role in preventing the most widespread malware from stealing confidential data from mobile devices," says Kay.

In other recent news, StrikeForce Technologies, Inc. announced today that Blank Rome LLP, a top 100 law firm has licensed StrikeForce's ProtectID Outof-Band Two-Factor Authentication Platform to protect remote access and their clients Intellectual Property.

"We were extremely pleased that Blank Rome has chosen to deploy our ProtectID Out-of-Band Two-Factor Authentication Platform," says Mark L. Kay, CEO of StrikeForce, "Blank Rome has been in business for more than sixty five years and is amongst the most prestigious Law Firms. They realize the importance of protecting network access and the intellectual property of their customers."

"As part of our effort to continue improving the Firm's overall security posture, Blank Rome decided to employ two-factor authentication to bolster the security of remote access to the Firm's network. After being introduced to StrikeForce Technologies' solution, we liked their approach to out-of-band authentication. We knew anything we implemented for this purpose had to be easy to use, as well as being secure and flexible. StrikeForce's system achieves this simplicity and flexibility by supporting a variety of methods to input the second factor, and it also is economical and easy to implement," says Laurence Liss, CTO of Blank Rome.

"For a long time now, law firms have worked under the implicit assumption that they were not targets of hackers. Law firms thought of themselves as above the rough and tumble world of spying and IP theft. However, all of that has changed," says Kay. "Law enforcement agencies throughout the world have warned of an increasing threat of hacking to law firms. These concerns have escalated to such an extent that the White House, the Attorney General and the FBI are publicly warning law firms to tackle the escalating risk of cyber attacks."

"Working with law firms to protect their remote access and intellectual property is now high on our radar, just within two months we helped Superior Discovery with similar concerns as they service many prominent law firms," says Kay.

For the complete interview with Mark L. Kay, StrikeForceTechnologies, Chairman and CEO, please click here (

For more information about:
ProtectID® (
GuardedID® (
MobileTrust® (; (OTCBB: SFORD)

Please read our Terms Of Use, Conditions, and Disclaimer



Cloud Expo
SYS-CON Events Announces Cloud Expo 2014 New York

14th International Cloud Expo to take place June 10-12, 2014, at the Javits Center in New York City

SYS-CON Events announced today that 14th Cloud Expo®, co-located with 5th Big Data Expo, 3rd SDDC Expo, 2nd DevOps Summit, 2nd WebRTC Summit, and 1st Things Expo, will take place June 10-12, 2014, at the Javits Center in New York City.

The three-day event will offer a vast selection of technical and strategic breakout sessions, General Sessions, Industry Keynotes, and "Power Panels" from a rock star conference faculty chosen from among the leading industry players in the cloud computing and Big Data worlds. The bustling Expo Floor will include two busy Demo Theaters so that as a delegate you can kick the tires of solutions and offerings, and discuss one-on-one with all the leading Cloud and Big Data players what they are offering and how to make use of it in your particular situation.

All the main layers of the Cloud ecosystem will be represented -- the infrastructure players, the platform providers, and those offering applications. The high-energy event is a must-attend for senior technologists from CEOs on down -- including CIOs, CTOs, directors of infrastructure, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, and communications and networking specialists.



Walter E. Washington Convention Center
801 Mt. Vernon Place NW, Washington DC 20001
URL:, Phone: (800) 746-0099, Email: [email protected]

For 37 years FOSE has served as the nation's premier event for government technology professionals seeking tools and best practices to equip their agency for the 21st century. From policy updates -- straight from the Hill -- and exclusive insights from today's leading authorities, to the most comprehensive showcase of technology in action -- it's all at FOSE.

FOSE's three-day conference addresses the most relevant and pressing technology and management priorities and issues for government and its private sector partners. With more than 60 sessions including keynotes, panel discussions and in-depth technical sessions, you can expect to take home best practices, policy updates and detailed guidance across 8 in-demand tracks.


GovSec 2014 Conference & Free Expo

Experience the Largest, Most Dynamic Government Security Expo in Washington, DC, May 13-14, FREE. Discover the newest trends, cutting-edge technology, tools, equipment and the exciting companies who provide them in the exhibit hall.

Plus, get valuable training to enhance your career without straining your budget at the full conference -- with conference prices starting at $99, you won't want to miss out!

GovSec resource trusted by thousands of security professionals and is the nation's premier event for government, homeland security, and law enforcement!

Get more information and register for the full conference or free expo today -- Readers save 10% on conference prices! Use code: PMG02 @


IFSEC International
ExCel London
June 17-19, 2014

If you're looking focused content, features and leading suppliers catering for every security requirement, IFSEC International in London is the only destination for you this June! With a global focus on expertise and guidance, you'll discover high level security content that covers both public and private security, from SMEs to the largest enterprises. An international gathering of over 28,000 professionals, the event is the key forum in which to meet with the manufacturers leading the way in security innovation, including Axis, Samsung, ASSA Abloy, Canon and many more.

If you're a trade visitor, take the opportunity to network with the potential clients with live projects, while sourcing your full range of kit on the show floor. If you're an end user, attend to meet the installers, integrators and consultants who can steer you towards an increasingly successful security strategy.

Register free of charge at
For more information about:
IFSEC Community:
IFSEC Directory:
IFSEC Events:


InfoSec World Conference & Expo 2014
April 7-9, 2014
Disney's Contemporary Resort
The event features 70+ sessions, dozens of case studies, 8 tracks (including a Hands-On Track), 11 in-depth workshops, 3 co-located summits and an exhibit hall showcasing the industry's leading vendors. With the primary objective of providing top-notch education to all levels of information security and IT auditing professionals, InfoSec World delivers practical sessions that give you the tools to strengthen your security without restricting your business!


Infosecurity Europe
th April - 01st May 2014

Network, engage and do business with +15,000 other information security professionals at 19th Infosecurity Europe 29th April - 01st May 2014

Infosecurity Europe is the largest and most attended information security event in Europe. Held in London, it is a free exhibition featuring over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme attracting visitors from every segment of the industry.

Collect CPD/CPE Credits

The Education Programme is shaped by the industry for the industry. Addressing the latest challenges and industry needs it will provide you with business critical insight, best practice and practical case studies. Speakers include information security thought-leaders from public and private sector end-users, policy-makers and government, analysts, industry experts, service providers and vendors.

Featuring five conference and seminar theatres and a comprehensive programme of workshops and training courses, attending the Infosecurity Europe Education Programme helps you to further develop your career and learning.

Meet with the key industry players

From the New Exhibitor zone to the Country Pavilions, discover the latest products and solutions of the local and international scene. This is your best opportunity to receiving expert advice and to discuss your needs with key information security players.

Infosecurity Europe is the most important date in the calendar for information security professionals across Europe. The attendees reflect every segment of the information security industry coming from key sectors including:

  • IT distribution companies
  • IT hardware, software, manufacturers and suppliers
  • End-user information security professionals
  • Government professionals

For more information and to register please visit


LinuxCon North America
Sheraton Chicago
August 20-22, 2014

LinuxCon is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.

LinuxCon Europe
Congress Centre Düsseldorf
Düsseldorf, Germany
October 13 - 15, 2014

LinuxCon Europe is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.


PSA Security Network

Mr. Bill Bozeman, CPP, CHS, President/CEO, told us, "... the TEC event will be May 5-9 in Colorado. TEC stands for Training, Exhibits and Conference. For this yearly event, which is open to the entire security industry, we took all the best parts of your typical security event and brought them together under one roof, and for one low price. At TEC you will get the training and education you need for your entire company with hundreds of hours of courses to choose from. We also offer physical security certifications, where you will get the opportunity to learn from the leading minds in the industry, and explore new and innovative ideas with your peers.

The full day exhibit hall is where attendees can see the latest products and service offerings from over 100 of the security industry's top manufacturers. Explore state-of-the-art technologies and cutting-edge business solutions that will prepare your company for success. And finally, the Conference portion of TEC. This is where you will become a part of the industry's best networking opportunities by engaging with your peers and technology leaders in a fast-paced, lively environment. For the complete interview with Bill Bozeman:

For more information:
Read the PSA Blog:
Locate A PSA Integrator:
PSA Vendor Partners:
PSA Education:


RFID Journal LIVE! 2014
Apr. 8-10, 2014 -- Orlando, Fla.

Learn how to track and manage everything at the world's largest RFID event, RFID Journal LIVE! 2014. RFID technologies are advancing rapidly and adoption is accelerating. Learn how your company can benefit at the only RFID event featuring more than 75 hours of education, more than 50 end-user case studies and more than 200 technology companies. Hear how industry leaders are benefitting from RFID in the defense, aerospace, health-care, pharmaceuticals, manufacturing, retail and apparel industries. See live demonstrations of the latest solutions and learn how to deploy the technology successfully.

Register VIP Discount: Save 15% with promo code EADW.


SDW 2014 - Exhibition sold out and exceeding all expectations

With still more than 4 months to go to SDW 2014, the SDW Exhibition has completely sold out, beating all previous records for the event. Some 103 companies have signed up to participate at the world's leading event for next-generation human identity and secure credential solutions, and a waiting list is in operation.

A full list of exhibiting companies can be viewed at:

Entry to the exhibition is free to registered visitors, and all visitors pre-registering before 9th May 2014 will be upgraded to Visitor Plus+ status and be entered into the SDW Conference Delegate draw with the chance of winning a free delegate pass to SDW 2014. In addition, they will receive a complimentary £ 5.00 catering voucher to use at the show.

Pre-registration can be completed at:

Delegates from government departments in Asia, Africa and Latin America can access the entire three day event, including the conference and exhibition for just £ 399 +VAT. Government attendees from other world regions can register for £ 499 +VAT (Rate expires 28th February 2014.) Plus, for multiple registrations for every government delegate registered, the second is at half price.

In addition, for 2014, all conference sessions will have simultaneous translation into French and Spanish.

Industry delegates are also able to attend the SDW 2014 conference at a discounted rate. The show operates a limited-availability, stepped pricing policy, meaning that delegates who book early access the lowest rates. Delegates can register online at:

Diary Date - SDW 2014, 16-18 June 2014, Queen Elizabeth II Conference Centre, London, UK


Security Industry Association (SIA)

Register for the 2014 SIA Government Summit

Registration is now open for the 2014 SIA Government Summit, hosted by the Security Association (SIA) June 3-4, 2014, at the W Hotel in Washington, D.C.

Register today for the SIA Government Summit!

SIA Members can register for $550; nonmembers for $775 through May 4.Registration includes breakfast and lunch both days as well as the semi-formal SIA Public Policy Dinner, where SIA recognizes leading legislators and outstanding SIA volunteers.

The Summit provides attendees with unparalleled policy insights that help create new market opportunities. The exclusive nature of the setting allows one-on-one conversations with government decision makers about legislation and regulations important to the security industry.

Questions about the SIA Government Summit? Contact Elizabeth Hunger at 301-804-4714 or [email protected].

SIA Unveils New Certification Exam

At ISC West in Las Vegas on April 4, the Security Industry Association (SIA) unveiled revised exam for its Certified Security Project Manager (CSPM®) certification program.

SIA will present the refreshed CSPM® Review Course and later this year. The 2.5-day, instructor-led training is offered to SIA Members for $995 and $1,295 for nonmembers. Contact Kimberly Roberts at 301-804-4708 or [email protected] for more information.

Register for the CSPM® Review Course

CSPM® Review Course Schedule:

May 5-7, in Westminster, Colo. (to be delivered at 2014 PSA-TEC, costs may vary)
June 10-12, in Pomona, Calif.
Aug. 4-6, in Silver Spring, Md.
Oct. 1-3, in Atlanta, Ga.

The CSPM® Review Course goes beyond foundational principles and offers newer and seasoned project managers clear perspective on the importance of their role to stakeholders and identifies risks that could hinder project success. Attendees receive the SIA Security Project Manager's Common Body of Knowledge Guidebook, which includes a compendium of resources, checklists, templates and other materials to help prepare for success on future projects.


Please read our Terms of Use, Conditions and Disclaimers ("Terms"):

By using our website and any information located at you agree to these "Terms."


Add to Digg Bookmark with Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@DevOpsSummit Stories
DevOps has often been described in terms of CAMS: Culture, Automation, Measuring, Sharing. While we’ve seen a lot of focus on the “A” and even on the “M”, there are very few examples of why the “C" is equally important in the DevOps equation. In her session at @DevOps Summit, Lori MacVittie, of F5 Networks, will explore HTTP/1 and HTTP/2 along with Microservices to illustrate why a collaborative culture between Dev, Ops, and the Network is critical to ensuring success.
Today, we are in the middle of a paradigm shift as we move from managing applications on VMs and containers to embracing everything that the cloud and XaaS (Everything as a Service) has to offer. In his session at 17th Cloud Expo, Kevin Hoffman, Advisory Solutions Architect at Pivotal Cloud Foundry, will provide an overview of 12-factor apps and migrating enterprise apps to the cloud. Kevin Hoffman is an Advisory Solutions Architect for Pivotal Cloud Foundry, and has spent the past 20 years building enterprise and mobile software for small businesses, massive enterprises, and everything in ...
SYS-CON Events announced today that has been named a "Bronze Sponsor" of SYS-CON's @DevOpsSummit Silicon Valley, which will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. provides open-source software ELK turned into a log analytics platform that is simple, infinitely- scalable, highly available, and secure.
DevOps delivers remarkable results. But does it help all of IT? Can traditional ‘mode 1’ IT benefit as much as innovative ‘mode 2’? How about the rest of your business? Or have you just shifted your bottleneck? And if so, what can you do about it? Improving dev and ops is necessary, but not sufficient. It often just shifts the burden sideways (e.g., to PMs, SQA, InfoSec, DBAs, NOC, etc.), upstream (to the PMO, Controller, Business Liaison, etc.), or downstream (to TechPubs, Service Desk, Training, etc.).
SYS-CON Events announced today that Alert Logic, the leading provider of Security-as-a-Service solutions for the cloud, has been named “Bronze Sponsor” of SYS-CON's 17th International Cloud Expo® and DevOps Summit 2015 Silicon Valley, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Alert Logic provides Security-as-a-Service for on-premises, cloud, and hybrid IT infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions.
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud without worrying about any lock-in fears. In fact by having standard APIs for IaaS would help PaaS expl...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ability. Many are unable to effectively engage and inspire, creating forward momentum in the direction...
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Clutch is now a Docker Authorized Consulting Partner, having completed Docker's certification course on the "Docker Accelerator for CI Engagements." More info about Clutch's success implementing Docker can be found here. Docker is an open platform for developers and system administrators to build, ship and run distributed applications. With Docker, IT organizations shrink application delivery from months to minutes, frictionlessly move workloads between data centers and the cloud and achieve 20x greater efficiency in their use of computing resources. Inspired by an active community and trans...
For almost two decades, businesses have discovered great opportunities to engage with customers and even expand revenue through digital systems, including web and mobile applications. Yet, even now, the conversation between the business and the technologists that deliver these systems is strained, in large part due to misaligned objectives. In his session at DevOps Summit, James Urquhart, Senior Vice President of Performance Analytics at SOASTA, Inc., will discuss how measuring user outcomes – including how the performance, flow and content of your digital systems affects those outcomes – ca...
DevOps is gaining traction in the federal government – and for good reasons. Heightened user expectations are pushing IT organizations to accelerate application development and support more innovation. At the same time, budgetary constraints require that agencies find ways to decrease the cost of developing, maintaining, and running applications. IT now faces a daunting task: do more and react faster than ever before – all with fewer resources.
The cloud has reached mainstream IT. Those 18.7 million data centers out there (server closets to corporate data centers to colocation deployments) are moving to the cloud. In his session at 17th Cloud Expo, Achim Weiss, CEO & co-founder of ProfitBricks, will share how two companies – one in the U.S. and one in Germany – are achieving their goals with cloud infrastructure. More than a case study, he will share the details of how they prioritized their cloud computing infrastructure deployments and the details they’ve learned. From performance to network configurations, they've got interesting...
Decisions about budgets and resources are often made without IT even having a seat at the table. As technologist we understand the value of DevOps - but do your business counterparts? If they don't, your DevOps initiatives could lose funding before they start. In her session at DevOps Summit, Jeanne Morain, Strategist / Author at iSpeak Cloud, LLC, will provide insights on how to bridge the gap between business and technology leaders. Attendees will learn prescriptive guidance on balancing workloads, critical communication processes and considerations for building out a solid return-on-inves...
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services and command line interfaces creates context-switching that slows productivity, efficiency, and may le...
While testing is often ignored when it comes to DevOps - it could be the most important aspect of achieving true DevOps success. Without rethinking automated testing from the ground-up, the entire DevOps productivity gain cannot be realized. Large tech companies build their own rapid test automation that runs in minutes across functional, performance, security and other tests. In his session at DevOps Summit, Kevin Surace, CEO of Appvance, will discuss how we learn from these real-world successes and achieve a 95% time reduction in creating and running automated unified tests. Otherwise ent...
SYS-CON Events announced today that JFrog, maker of Artifactory, the popular Binary Repository Manager, will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based in California, Israel and France, founded by longtime field-experts, JFrog, creator of Artifactory and Bintray, has provided the market with the first Binary Repository solution and a software distribution social platform.
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
Docker is hot. However, as Docker container use spreads into more mature production pipelines, there can be issues about control of Docker images to ensure they are production-ready. Is a promotion-based model appropriate to control and track the flow of Docker images from development to production? In his session at DevOps Summit, Fred Simon, Co-founder and Chief Architect of JFrog, will demonstrate how to implement a promotion model for Docker images using a binary repository, and then show how to distribute them to any kind of consumer, being it a customer or a data center.
DevOps is speeding towards the IT world like a freight train and the hype around it is deafening. There is no reason to be afraid of this change as it is the natural reaction to the agile movement that revolutionized development just a few years ago. By definition, DevOps is the natural alignment of IT performance to business profitability. The relevance of this has yet to be quantified but it has been suggested that the route to the CEO’s chair will come from the IT leaders that successfully make the transition to a DevOps model. If this still seems foreign to you, I recommend reading up on D...
SYS-CON Events announced today that Cloud Raxak has been named “Media & Session Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Raxak Protect automates security compliance across private and public clouds. Using the SaaS tool or managed service, developers can deploy cloud apps quickly, cost-effectively, and without error.
The principles behind DevOps are not new - for decades people have been automating system administration and decreasing the time to deploy apps and perform other management tasks. However, only recently did we see the tools and the will necessary to share the benefits and power of automation with a wider circle of people. In his session at DevOps Summit, Bernard Sanders, Chief Technology Officer at CloudBolt Software, will explore the latest tools including Puppet, Chef, Docker, and CMPs needed to move from an insulated culture where automation is absent or hoarded to one where the power of ...
SYS-CON Media announced that Splunk, a provider of the leading software platform for real-time Operational Intelligence, has launched an ad campaign on Big Data Journal. Splunk software and cloud services enable organizations to search, monitor, analyze and visualize machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. The ads focus on delivering ROI - how improved uptime delivered $6M in annual ROI, improving customer operations by mining large volumes of unstructured data, and how data tracking delivers uptime when it matters most.
As a company adopts a DevOps approach to software development, what are key things that both the Dev and Ops side of the business must keep in mind to ensure effective continuous delivery? In his session at DevOps Summit, Mark Hydar, Head of DevOps, Ericsson TV Platforms, will share best practices and provide helpful tips for Ops teams to adopt an open line of communication with the development side of the house to ensure success between the two sides.
At first adopted by enterprises to consolidate physical servers, virtualization is now widely used in cloud computing to offer elasticity and scalability. On the other hand, Docker has developed a new way to handle Linux containers, inspired by version control software such as Git, which allows you to keep all development versions. In his session at 17th Cloud Expo, Dominique Rodrigues, the co-founder and CTO of Nanocloud Software, will discuss how in order to also handle QEMU / KVM virtual machines versions, they have developed a new tool, called Vm_commit, which can create commits, backup ...
Even though you are running an agile development process, that doesn’t necessarily mean that your performance testing is being conducted in a truly agile way. Saving performance testing for a “final sprint” before release still treats it like a waterfall development step, with all the cost and risk that comes with that. In this post, we will show you how to make load testing happen early and often by putting SLAs on the agile task board.