|By Marketwired .||
|April 8, 2014 12:01 AM EDT||
RYE BROOK, NY -- (Marketwired) -- 04/08/14 -- ImageWare Systems, Inc. (OTCQB: IWSY) and StrikeForce Technologies, Inc. (OTCBB: SFORD)
Ms. Jody Ross, Vice President of Business Development, AMAG Technology, told us, "AMAG's Symmetry access control system is the best software on the market today. Our software and hardware come packed with features that other manufacturers charge for. The GUI is similar to Microsoft's so it's familiar to everyone, reducing training time, and it integrates to a wide variety of technology partners to provide video, audio, HR, etc. options to customers who need those options. Innovative features such as Alarm Workflow, Task Manager and Threat Level Manager allow security directors to better manage their security team's response times and actions, and secure their building during crisis situations. Symmetry is a leading-edge security system designed for buildings of any kind, which combines all aspects of security into a single well-designed and future-proof software solution suitable for small, large or very large applications."
For the complete interview with Jody Ross: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_JodyRoss.html
For more information www.AMAG.com and please see the following links:
About AMAG: http://www.amag.com/About-AMAG-Technology.aspx
AMAG Products: http://www.amag.com/Products.aspx
AMAG Solutions: http://www.amag.com/solutions.aspx
AMAG Services & Support: http://www.amag.com/Support.aspx
AMAG Partners: http://www.amag.com/area-of-interest.aspx
AMAG Case Studies: http://www.amag.com/Case-Studies.aspx
AMAG Resources: http://www.amag.com/library.aspx
AMAG News: http://www.amag.com/library/News.aspx
HP Enterprise Services
Mr. John Felker, Director, Cyber and Intelligence Strategy, HP Enterprise Services, U.S. Public Sector, told us, "HP takes an enterprise view of security which, in turn, helps our clients overcome the limitations typically associated with historical and siloed views of risk mitigation, globalized security and cost reductions. With the increased deployment of digital technologies, frequently operated remotely and unmanned, comes the need for increased cyber- and physical security for critical assets such as SCADA systems. At HP, we don't simply improve your security posture to address threats and manage risk and compliance, we also bring to bear an array of services, solutions and industry-leading technology to ensure you maintain a proactive, mature and agile security posture designed to navigate through ever-evolving threat and regulatory landscapes. By leveraging cloud, big data and mobility initiatives, you can evolve into a more proactive operating model which will increase productivity, optimize resource utilization and help you build and maintain safe, secure and environmentally sound operations."
For the complete interview with John Felker: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_HP_JohnFelker.html
For more information on these topics:
Risk Management and Compliance for US Public Sector
Cybersecurity for U.S. Public Sector (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1087497)
Public Sector Services and Solutions (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1131347)
ImageWare Systems, Inc. (OTCQB: IWSY) (ImageWare), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, has issued financial results for the fourth quarter and full year ended December 31, 2013, as well as provided a corporate update to highlight the company's progress since its last update on November 14, 2013.
Key Milestones and Events
- Initiated a pilot with T-Systems, a wholly owned subsidiary of one of the world's leading integrated telecommunications companies, Deutsche Telekom AG. The partnership will start with a pilot in T-Systems' labs in Germany to integrate ImageWare's patented, multi-modal biometric, cloud-based identity management and credential technology into T-Systems' products.
- Completed delivery of ImageWare's QuickCapture application in connection with a U.S. federally sponsored pilot program for iris recognition with 20 state and local law enforcement agencies.
- Recognized as 2014 Innovation and Design Award Winner for its Biometric Engine 2.0® by industry research firm Envisioneering at the Mobile World Congress in Barcelona, Spain.
- Settled patent litigation with WCC Services US (WCC) and Creative Information Technology (CITI) that resulted in WCC and CITI obtaining royalty bearing licenses from IWSY for the patents at issue. These patents cover IWSY's multi-modal biometric platform and fusion of biometric modalities.
Fourth Quarter and Full Year 2013 Financial Results
Total revenues in the fourth quarter of 2013 increased to $929,000 from $926,000 in the fourth quarter of 2012. Total revenues for the full year of 2013 increased 135% to $5.3 million from $4.0 million in 2012, with the increase primarily due to approximately $1.5 million received in August for software licenses in connection with a $2.2 million contract with the U.S. Department of Veteran Affairs.
Gross margin in the fourth quarter of 2013 increased 160 basis points to 72.4% compared to 70.8% in the fourth quarter of 2012, with the increase primarily due to reduced costs from the relocation of certain technical support functions from the company's Canadian office to its San Diego office. Gross margin for the full year of 2013 increased to 79.4% from 69.6% in 2012, with the increase primarily due to higher software license revenues and, to a lesser extent, savings from the aforementioned relocation of technical support functions.
Net loss in the fourth quarter of 2013 was $1.8 million, or ($0.02) per diluted share, compared to net income of $62,000, or $0.00 per diluted share, in the fourth quarter of 2012. Net income in the fourth quarter of 2012 included a $1.8 million gain from the change in fair value of derivative liabilities. Net loss in the full year of 2013 was $9.9 million, or ($0.12) per diluted share, compared to a net loss of $10.2 million, or ($0.14) per diluted share, in 2012. Net loss in 2013 included a $4.8 million loss from the change in fair value of derivative liabilities, while net loss in 2012 included a $ $4.7 million loss from the change in fair value of derivative liabilities.
At December 31, 2013, cash and cash equivalents totaled $2.4 million compared to $4.2 million at December 31, 2012. The company continues to carry virtually no debt and, subsequent to the end of the quarter, increased their line of credit from $2.5 million to $3.5 million.
"2013 was a pivotal year for ImageWare, as we formed partnerships with two of the world's largest IT services providers, Fujitsu and T-Systems," said Jim Miller, chairman and CEO of ImageWare. "We are starting to see a shift in companies evangelizing biometrics, moving from the small biometric companies trying to prove their practical application in the commercial and consumer markets, to many large corporations understanding the real-world benefits of bringing biometrics to the mainstream public. This shift has created an attractive opportunity for ImageWare and we plan to leverage our large partners' sales and marketing power to capitalize on it.
"Our new partnership and close collaboration with T-Systems represents the outcome of a number of months of discussion and planning. We're now taking the next step by integrating our technology into their products and expect this new relationship to expand our presence throughout European and worldwide markets.
"These and other proactive steps we've taken to position ImageWare as a leader in multi-modal biometric security are beginning to attract broader attention. We recently attended the Mobile World Congress in Barcelona where the reception we received was incredible, particularly for our patented PillPhone®, which is the first and only FDA-approved biometric-enabled enterprise mobile application."
Miller concluded: "Working closely with our technology partners, we continue to build a healthy pipeline of potential customers and are currently in discussions with several clients regarding licensing opportunities. We will continue to target large enterprise businesses and emerging applications and believe the steps we are taking to advance our cloud, SaaS and mobile offerings in the commercial and consumer marketplace will continue to build shareholder value, along with greater visibility that includes a healthy recurring revenue stream."
For more information, please click here.
For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here (http://www.securitystockwatch.com/Interviews/in_Boardroom_ImageWare.html)
For more information:
IWS CloudID: http://iwsinc.com/products/next-generation-iws-cloudid-product-suite/
ImageWare Systems Solutions: http://www.iwsinc.com/markets/overview
ImageWare Systems Products: http://www.iwsinc.com/products/overview2
For ImageWare Systems Investors: http://www.iwsinc.com/about-iws/investors/overview1
For more information: www.iwsinc.com
Recently announced that...
And, in other recent news...March Networks announced that...
For More Information About March Networks Solutions:
March Networks Financial Solutions (www.marchnetworks.com/solutions/financial/default.aspx)
March Networks Retail Solutions (www.marchnetworks.com/solutions/retail/default.aspx)
March Network Airports-Seaports Solutions (http://www.marchnetworks.com/solutions/airports-seaports/default.aspx)
March Network Commercial-Industrial Solutions (http://www.marchnetworks.com/solutions/commercial-industrial/default.aspx)
March Networks Critical Infrastructure Solutions (http://www.marchnetworks.com/solutions/critical-infrastructure/default.aspx)
March Networks Government Solutions (http://www.marchnetworks.com/solutions/government/default.aspx)
And, For More Information:
About March Networks (www.marchnetworks.com/company/about-us/)
What's New At March Networks (www.marchnetworks.com/products/whats-new.aspx)
March Networks Blog (http://www.marchnetworks.com/intelligent-ip-video-blog/)
For the latest March Networks News (www.marchnetworks.com/company/news-center/2013/9/24/497)
StrikeForce Technologies, Inc., a company that specializes in Cyber Security solutions for the prevention of Data Breaches and Cyber Theft, recently announced it has received an official Notice of Allowance from the United States Patent Office stating that a second patent application titled "Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser" has been approved for issuance.
"We are extremely excited about receiving this Notice of Allowance for our Keystroke Encryption technology," says Mark L. Kay, CEO of StrikeForce, "it has game changing implications for our Company and the industry. This expands on our original patent and includes: all computers, smart phones, tablets, and all the keystrokes you enter. Our patented Keystroke Encryption technology proactively encrypts each and every keystroke typed on a keyboard. All security experts agree that the use of encryption is the best way to protect data on your mobile device," continues Kay. "Until we developed our Keystroke Encryption Technology for mobile devices, there wasn't any way to encrypt data in motion at the point of origin, when typed on a mobile device keyboard."
"Additionally, as announced two weeks ago on March 11th, StrikeForce has received an official Notice of Allowance from the US Patent and Trademark Office that we have been approved for Issuance of our third patent for Out-of-Band Authentication," says Kay. "Our patent portfolio continues to increase. After these two Notices become patents, StrikeForce will then own five patents in our portfolio, and there will still be three more pending. Owning the patents for Keystroke Encryption and Out-of-Band Authentication positions us on the forefront of what is hot in security and regulatory requirements today, as seen through our new contracts and increasing pipeline. As we learned at the recent RSA Security Show, these are the types of product purchasesnow being included in security budgets. Our increasing patent portfolio also improves our value as we continue to protect our intellectual property assets."
The timing of this Notice of Allowance coincides perfectly with StrikeForce's recently announced two new mobile products (MobileTrust® and GuardedID® Mobile SDK). Both products already include our patented keystroke encryption technology and should be available within the next thirty to sixty days. Individuals and Corporations will now for the first time, be able to protect themselves with our MobileTrust application, while mobile application developers will be able to build our one-of-a-kind Keystroke Encryption technology directly into their mobile applications.
"Keystroke Encryption is an extremely critical security technology, which plays a major role in preventing the most widespread malware from stealing confidential data from mobile devices," says Kay.
In other recent news, StrikeForce Technologies, Inc. announced today that Blank Rome LLP, a top 100 law firm has licensed StrikeForce's ProtectID Outof-Band Two-Factor Authentication Platform to protect remote access and their clients Intellectual Property.
"We were extremely pleased that Blank Rome has chosen to deploy our ProtectID Out-of-Band Two-Factor Authentication Platform," says Mark L. Kay, CEO of StrikeForce, "Blank Rome has been in business for more than sixty five years and is amongst the most prestigious Law Firms. They realize the importance of protecting network access and the intellectual property of their customers."
"As part of our effort to continue improving the Firm's overall security posture, Blank Rome decided to employ two-factor authentication to bolster the security of remote access to the Firm's network. After being introduced to StrikeForce Technologies' solution, we liked their approach to out-of-band authentication. We knew anything we implemented for this purpose had to be easy to use, as well as being secure and flexible. StrikeForce's system achieves this simplicity and flexibility by supporting a variety of methods to input the second factor, and it also is economical and easy to implement," says Laurence Liss, CTO of Blank Rome.
"For a long time now, law firms have worked under the implicit assumption that they were not targets of hackers. Law firms thought of themselves as above the rough and tumble world of spying and IP theft. However, all of that has changed," says Kay. "Law enforcement agencies throughout the world have warned of an increasing threat of hacking to law firms. These concerns have escalated to such an extent that the White House, the Attorney General and the FBI are publicly warning law firms to tackle the escalating risk of cyber attacks."
"Working with law firms to protect their remote access and intellectual property is now high on our radar, just within two months we helped Superior Discovery with similar concerns as they service many prominent law firms," says Kay.
For more information about:
www.strikeforcetech.com; (OTCBB: SFORD)
SYS-CON Events Announces Cloud Expo 2014 New York
14th International Cloud Expo to take place June 10-12, 2014, at the Javits Center in New York City
SYS-CON Events announced today that 14th Cloud Expo®, co-located with 5th Big Data Expo, 3rd SDDC Expo, 2nd DevOps Summit, 2nd WebRTC Summit, and 1st Things Expo, will take place June 10-12, 2014, at the Javits Center in New York City.
The three-day event will offer a vast selection of technical and strategic breakout sessions, General Sessions, Industry Keynotes, and "Power Panels" from a rock star conference faculty chosen from among the leading industry players in the cloud computing and Big Data worlds. The bustling Expo Floor will include two busy Demo Theaters so that as a delegate you can kick the tires of solutions and offerings, and discuss one-on-one with all the leading Cloud and Big Data players what they are offering and how to make use of it in your particular situation.
All the main layers of the Cloud ecosystem will be represented -- the infrastructure players, the platform providers, and those offering applications. The high-energy event is a must-attend for senior technologists from CEOs on down -- including CIOs, CTOs, directors of infrastructure, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, and communications and networking specialists.
For 37 years FOSE has served as the nation's premier event for government technology professionals seeking tools and best practices to equip their agency for the 21st century. From policy updates -- straight from the Hill -- and exclusive insights from today's leading authorities, to the most comprehensive showcase of technology in action -- it's all at FOSE.
FOSE's three-day conference addresses the most relevant and pressing technology and management priorities and issues for government and its private sector partners. With more than 60 sessions including keynotes, panel discussions and in-depth technical sessions, you can expect to take home best practices, policy updates and detailed guidance across 8 in-demand tracks.
GovSec 2014 Conference & Free Expo
Experience the Largest, Most Dynamic Government Security Expo in Washington, DC, May 13-14, FREE. Discover the newest trends, cutting-edge technology, tools, equipment and the exciting companies who provide them in the exhibit hall.
Plus, get valuable training to enhance your career without straining your budget at the full conference -- with conference prices starting at $99, you won't want to miss out!
GovSec resource trusted by thousands of security professionals and is the nation's premier event for government, homeland security, and law enforcement!
Get more information and register for the full conference or free expo today -- SecuritySolutionsWatch.com Readers save 10% on conference prices! Use code: PMG02 @ www.GovSecInfo.com.
June 17-19, 2014
If you're looking focused content, features and leading suppliers catering for every security requirement, IFSEC International in London is the only destination for you this June! With a global focus on expertise and guidance, you'll discover high level security content that covers both public and private security, from SMEs to the largest enterprises. An international gathering of over 28,000 professionals, the event is the key forum in which to meet with the manufacturers leading the way in security innovation, including Axis, Samsung, ASSA Abloy, Canon and many more.
If you're a trade visitor, take the opportunity to network with the potential clients with live projects, while sourcing your full range of kit on the show floor. If you're an end user, attend to meet the installers, integrators and consultants who can steer you towards an increasingly successful security strategy.
Register free of charge at www.ifsec.co.uk/register
For more information about:
IFSEC Community: http://www.ifsecglobal.com/
IFSEC Directory: http://directory.ifsecglobal.com/
IFSEC Events: http://www.ifsecglobal.com/events/
InfoSec World Conference & Expo 2014
April 7-9, 2014
Disney's Contemporary Resort
The event features 70+ sessions, dozens of case studies, 8 tracks (including a Hands-On Track), 11 in-depth workshops, 3 co-located summits and an exhibit hall showcasing the industry's leading vendors. With the primary objective of providing top-notch education to all levels of information security and IT auditing professionals, InfoSec World delivers practical sessions that give you the tools to strengthen your security without restricting your business!
29th April - 01st May 2014
Network, engage and do business with +15,000 other information security professionals at 19th Infosecurity Europe 29th April - 01st May 2014
Infosecurity Europe is the largest and most attended information security event in Europe. Held in London, it is a free exhibition featuring over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme attracting visitors from every segment of the industry.
Collect CPD/CPE Credits
The Education Programme is shaped by the industry for the industry. Addressing the latest challenges and industry needs it will provide you with business critical insight, best practice and practical case studies. Speakers include information security thought-leaders from public and private sector end-users, policy-makers and government, analysts, industry experts, service providers and vendors.
Featuring five conference and seminar theatres and a comprehensive programme of workshops and training courses, attending the Infosecurity Europe Education Programme helps you to further develop your career and learning.
Meet with the key industry players
From the New Exhibitor zone to the Country Pavilions, discover the latest products and solutions of the local and international scene. This is your best opportunity to receiving expert advice and to discuss your needs with key information security players.
Infosecurity Europe is the most important date in the calendar for information security professionals across Europe. The attendees reflect every segment of the information security industry coming from key sectors including:
- IT distribution companies
- IT hardware, software, manufacturers and suppliers
- End-user information security professionals
- Government professionals
For more information and to register please visit http://www.infosec.co.uk/visiting/
LinuxCon North America
August 20-22, 2014
LinuxCon is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.
Congress Centre Düsseldorf
October 13 - 15, 2014
LinuxCon Europe is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.
PSA Security Network
Mr. Bill Bozeman, CPP, CHS, President/CEO, told us, "... the TEC event will be May 5-9 in Colorado. TEC stands for Training, Exhibits and Conference. For this yearly event, which is open to the entire security industry, we took all the best parts of your typical security event and brought them together under one roof, and for one low price. At TEC you will get the training and education you need for your entire company with hundreds of hours of courses to choose from. We also offer physical security certifications, where you will get the opportunity to learn from the leading minds in the industry, and explore new and innovative ideas with your peers.
The full day exhibit hall is where attendees can see the latest products and service offerings from over 100 of the security industry's top manufacturers. Explore state-of-the-art technologies and cutting-edge business solutions that will prepare your company for success. And finally, the Conference portion of TEC. This is where you will become a part of the industry's best networking opportunities by engaging with your peers and technology leaders in a fast-paced, lively environment. For the complete interview with Bill Bozeman: www.securitysolutionswatch.com/Interviews/in_Boardroom_PSA.html.
For more information: www.buyPSA.com
Read the PSA Blog: http://blog.buypsa.com/blog
Locate A PSA Integrator: http://www.buypsa.com/Integrators
PSA Vendor Partners: http://www.buypsa.com/Vendors
PSA Education: http://www.buypsa.com/Education
RFID Journal LIVE! 2014
Apr. 8-10, 2014 -- Orlando, Fla.
Learn how to track and manage everything at the world's largest RFID event, RFID Journal LIVE! 2014. RFID technologies are advancing rapidly and adoption is accelerating. Learn how your company can benefit at the only RFID event featuring more than 75 hours of education, more than 50 end-user case studies and more than 200 technology companies. Hear how industry leaders are benefitting from RFID in the defense, aerospace, health-care, pharmaceuticals, manufacturing, retail and apparel industries. See live demonstrations of the latest solutions and learn how to deploy the technology successfully.
Register now-SecuritySolutionsWatch.com VIP Discount: Save 15% with promo code EADW.
SDW 2014 - Exhibition sold out and exceeding all expectations
With still more than 4 months to go to SDW 2014, the SDW Exhibition has completely sold out, beating all previous records for the event. Some 103 companies have signed up to participate at the world's leading event for next-generation human identity and secure credential solutions, and a waiting list is in operation.
A full list of exhibiting companies can be viewed at: http://www.sdw2014.com/exhibitors/
Entry to the exhibition is free to registered visitors, and all visitors pre-registering before 9th May 2014 will be upgraded to Visitor Plus+ status and be entered into the SDW Conference Delegate draw with the chance of winning a free delegate pass to SDW 2014. In addition, they will receive a complimentary £ 5.00 catering voucher to use at the show.
Pre-registration can be completed at: http://www.sdw2014.com/visitor-registration
Delegates from government departments in Asia, Africa and Latin America can access the entire three day event, including the conference and exhibition for just £ 399 +VAT. Government attendees from other world regions can register for £ 499 +VAT (Rate expires 28th February 2014.) Plus, for multiple registrations for every government delegate registered, the second is at half price.
In addition, for 2014, all conference sessions will have simultaneous translation into French and Spanish.
Industry delegates are also able to attend the SDW 2014 conference at a discounted rate. The show operates a limited-availability, stepped pricing policy, meaning that delegates who book early access the lowest rates. Delegates can register online at: http://www.sdw2014.com/delegate-booking
Diary Date - SDW 2014, 16-18 June 2014, Queen Elizabeth II Conference Centre, London, UK
Security Industry Association (SIA)
Register for the 2014 SIA Government Summit
Registration is now open for the 2014 SIA Government Summit, hosted by the Security Association (SIA) June 3-4, 2014, at the W Hotel in Washington, D.C.
SIA Members can register for $550; nonmembers for $775 through May 4.Registration includes breakfast and lunch both days as well as the semi-formal SIA Public Policy Dinner, where SIA recognizes leading legislators and outstanding SIA volunteers.
The Summit provides attendees with unparalleled policy insights that help create new market opportunities. The exclusive nature of the setting allows one-on-one conversations with government decision makers about legislation and regulations important to the security industry.
Questions about the SIA Government Summit? Contact Elizabeth Hunger at 301-804-4714 or [email protected].
SIA Unveils New Certification Exam
At ISC West in Las Vegas on April 4, the Security Industry Association (SIA) unveiled revised exam for its Certified Security Project Manager (CSPM®) certification program.
SIA will present the refreshed CSPM® Review Course and later this year. The 2.5-day, instructor-led training is offered to SIA Members for $995 and $1,295 for nonmembers. Contact Kimberly Roberts at 301-804-4708 or [email protected] for more information.
CSPM® Review Course Schedule:
May 5-7, in Westminster, Colo. (to be delivered at 2014 PSA-TEC, costs may vary)
June 10-12, in Pomona, Calif.
Aug. 4-6, in Silver Spring, Md.
Oct. 1-3, in Atlanta, Ga.
The CSPM® Review Course goes beyond foundational principles and offers newer and seasoned project managers clear perspective on the importance of their role to stakeholders and identifies risks that could hinder project success. Attendees receive the SIA Security Project Manager's Common Body of Knowledge Guidebook, which includes a compendium of resources, checklists, templates and other materials to help prepare for success on future projects.
By using our website and any information located at www.SecuritySolutionsWatch.com you agree to these "Terms."
Some developers believe that monitoring is a function of the operations team. Some operations teams firmly believe that monitoring the systems they maintain is sufficient to run the business successfully. Most of them are wrong. The complexity of today's applications have gone far and beyond the capabilities of "traditional" system-level monitoring tools and approaches and requires much broader knowledge of business and applications as a whole. The goal of DevOps is to connect all aspects of application development and operations, and monitoring provides visibility and troubleshooting tools to...
Nov. 27, 2014 04:30 PM EST Reads: 843
15th Cloud Expo, which took place Nov. 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, expanded the conference content of @ThingsExpo, Big Data Expo, and DevOps Summit to include two developer events. IBM held a Bluemix Developer Playground on November 5 and ElasticBox held a Hackathon on November 6. Both events took place on the expo floor. The Bluemix Developer Playground, for developers of all levels, highlighted the ease of use of Bluemix, its services and functionality and provide short-term introductory projects that developers can complete between sessions.
Nov. 27, 2014 04:30 PM EST Reads: 974
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques that facilitate higher value creation for your enterprise.
Nov. 27, 2014 04:30 PM EST Reads: 1,019
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Among the proven benefits, DevOps is correlated with 2...
Nov. 27, 2014 04:00 PM EST Reads: 1,634
Want to enable self-service provisioning of application environments in minutes that mirror production? Can you automatically provide rich data with code-level detail back to the developers when issues occur in production? In his session at DevOps Summit, David Tesar, Microsoft Technical Evangelist on Microsoft Azure and DevOps, will discuss how to accomplish this and more utilizing technologies such as Microsoft Azure, Visual Studio online, and Application Insights in this demo-heavy session.
Nov. 27, 2014 03:45 PM EST Reads: 1,004
When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hybrid cloud. Traditional networking approaches for building a hybrid cloud try to kludge together the enterprise infrastructure with the public cloud. Consequently this approach requires risky, deep "surgery" including changes to firewalls, subnets and other modifications to the corporate security infrastructure. Connecting a public cloud to the ...
Nov. 27, 2014 03:45 PM EST Reads: 1,045
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With "smart" appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user's habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps, abiding by privacy concerns and making the concept a reality. These challenges can't be addressed w...
Nov. 27, 2014 07:45 AM EST Reads: 1,455
High-performing enterprise Software Quality Assurance (SQA) teams validate systems that are ready for use - getting most actively involved as components integrate and form complete systems. These teams catch and report on defects, making sure the customer gets the best software possible. SQA teams have leveraged automation and virtualization to execute more thorough testing in less time - bringing Dev and Ops together, ensuring production readiness. Does the emergence of DevOps mean the end of Enterprise SQA? Does the SQA function become redundant? In her session at DevOps Summit, Anne Hungat...
Nov. 27, 2014 05:00 AM EST Reads: 1,236
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there are those that talk about culture change as a set of behaviors that need to be adopted by those in IT. There is no question that businesses successful in adopting a DevOps mindset have seen departmental culture change, the question remains, is culture the leading edge of this change? I posit that in large enterprises,...
Nov. 25, 2014 07:00 PM EST Reads: 1,035
Our expectations for buying all sorts of consumer goods has gone through a radical transformation we now take for granted. Why should we not expect this same level of service from IT businesses? We accept the status quo for how software delivery exists today but would reject it without hesitation if it were applied to pretty much any other online consumer experience. Take pizza delivery as an example. Fifteen years ago ordering a pizza meant trying to choose an item from a grease-stained menu somebody shoved under your door. You'd make a phone call and end up speaking to somebody who sounded ...
Nov. 24, 2014 11:00 PM EST Reads: 2,282
Leysin American School is an exclusive, private boarding school located in Leysin, Switzerland. Leysin selected an OpenStack-powered, private cloud as a service to manage multiple applications and provide development environments for students across the institution. Seeking to meet rigid data sovereignty and data integrity requirements while offering flexible, on-demand cloud resources to users, Leysin identified OpenStack as the clear choice to round out the school's cloud strategy. Additionally, the school sought a partner to provide OpenStack infrastructure deployment and operations expert...
Nov. 23, 2014 08:00 AM EST Reads: 1,570
We are all here because we are sold on the transformative promise of The Cloud. But what good is all of this ephemeral, on-demand infrastructure if your usage doesn't actually improve the agility and speed of your business? How must Operations adapt in order to avoid stifling your Cloud initiative? In his session at DevOps Summit, Damon Edwards, co-founder and managing partner of the DTO Solutions, will highlight the successful organizational, process, and tooling patterns of high-performing companies that have reshaped their Operations to enable the business to get full value from their Clo...
Nov. 23, 2014 02:00 AM EST Reads: 1,366
Software-driven innovation is becoming a primary approach to how businesses create and deliver new value to customers. A survey of 400 business and IT executives by the IBM Institute for Business Value showed businesses that are more effective at software delivery are also more profitable than their peers nearly 70 percent of the time (1). DevOps provides a way for businesses to remain competitive, applying lean and agile principles to software development to speed the delivery of software that meets new market requirements. IBM's new DevOps Innovation Services help address the challenge of s...
Nov. 22, 2014 08:00 PM EST Reads: 1,685
Docker offers a new, lightweight approach to application portability. Applications are shipped using a common container format and managed with a high-level API. Their processes run within isolated namespaces that abstract the operating environment independently of the distribution, versions, network setup, and other details of this environment. This "containerization" has often been nicknamed "the new virtualization." But containers are more than lightweight virtual machines. Beyond their smaller footprint, shorter boot times, and higher consolidation factors, they also bring a lot of new fea...
Nov. 22, 2014 06:45 PM EST Reads: 1,505
The move in recent years to cloud computing services and architectures has added significant pace to the application development and deployment environment. When enterprise IT can spin up large computing instances in just minutes, developers can also design and deploy in small time frames that were unimaginable a few years ago. The consequent move toward lean, agile, and fast development leads to the need for the development and operations sides to work very closely together. Thus, DevOps becomes essential for any ambitious enterprise today.
Nov. 22, 2014 05:45 PM EST Reads: 1,589
ARMONK, N.Y., Nov. 20, 2014 /PRNewswire/ -- IBM (NYSE: IBM) today announced that it is bringing a greater level of control, security and flexibility to cloud-based application development and delivery with a single-tenant version of Bluemix, IBM's platform-as-a-service. The new platform enables developers to build ap...
Nov. 22, 2014 05:30 PM EST Reads: 1,595
SYS-CON Media announced today that Aruna Ravichandran, VP of Marketing, Application Performance Management and DevOps at CA Technologies, has joined DevOps Journal’s authors. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. DevOps Journal brings valuable information to DevOps professionals who are transforming the way enterprise IT is done. Aruna's inaugural article "Four Essential Cultural Hacks for DevOps Newbies" discusses how to demonstrate the value of DevOps behaviors, tools and processes. She states: "DevOps is not only hot it's the approa...
Nov. 21, 2014 07:00 PM EST Reads: 1,407
"Our premise is Docker is not enough. That's not a bad thing - we actually love Docker. At ActiveState all our products are based on open source technology and Docker is an up-and-coming piece of open source technology," explained Bart Copeland, President & CEO of ActiveState Software, in this SYS-CON.tv interview at DevOps Summit at Cloud Expo®, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Nov. 20, 2014 10:30 PM EST Reads: 1,460
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential.
Nov. 20, 2014 09:00 PM EST Reads: 1,607
At first glance, it might seem that the goals of DevOps and regulatory compliance are inherently at odds. Whereas much of the buzz around DevOps advocates delivering software at dizzying rates, compliance and security are concerned with proper oversight of the change management process to ensure that the enterprise isn’t opening itself up to potential vulnerabilities. With the tedious amount of rules and regulations that enterprises are subjected to, compliance can end up being a governor on the release process, defeating the potential benefits from adopting DevOps practices.
Nov. 19, 2014 10:00 PM EST Reads: 1,442
SYS-CON Media announced today the IBM, which offers the world’s deepest portfolio of technologies and expertise that are transforming the future of work, has launched ad campaigns on SYS-CON’s numerous online magazines such as Cloud Computing Journal, DevOps Journal, Virtualization Journal, and IoT Journal. IBM's campaigns focus on application testing, improving application development processes, common challenges in testing composite applications, continuous testing as part of the DevOps lifecycle, and deploying higher quality software faster through continuous integration testing.
Nov. 19, 2014 08:15 PM EST Reads: 1,576
Considered by many as the next step beyond Agile, DevOps has proven to be effective at accelerating development cycles, improving performance, reducing bugs and overall improving the innovation and velocity of development teams. There are a couple ways to look at DevOps: first, DevOps is a development methodology based on continuous integration and continuous delivery supported by set of configuration management tools such as Chef, Puppet, Salt and Ansible. We can also think of DevOps as a simpler set of principles that guide development and deployment practices – automate everything, monitor...
Nov. 19, 2014 08:00 PM EST Reads: 1,580
Cloud computing started a technology revolution; now DevOps is driving that revolution forward. By enabling new approaches to service delivery, cloud and DevOps together are delivering even greater speed, agility, and efficiency. No wonder leading innovators are adopting DevOps and cloud together! In his session at DevOps Summit, Andi Mann, Vice President of Strategic Solutions at CA Technologies, explored the synergies in these two approaches, with practical tips, techniques, research data, war stories, case studies, and recommendations on how to: Embrace, source, consume, and expose shared...
Nov. 17, 2014 10:00 AM EST Reads: 1,774
Software is eating the world. Companies that were not previously in the technology space now find themselves competing with Google and Amazon on speed of innovation. As the innovation cycle accelerates, companies must embrace rapid and constant change to both applications and their infrastructure, and find a way to deliver speed and agility of development without sacrificing reliability or efficiency of operations. In her Day 2 Keynote DevOps Summit, Victoria Livschitz, CEO of Qubell, discussed how IT organizations can automate just-in-time assembly of application environments - each built fo...
Nov. 17, 2014 09:00 AM EST Reads: 1,627
AppDynamics is the next-generation application performance management solution that simplifies the management of complex, business-critical apps. No one can stand slow applications - not IT operations and development teams, not the Chief Information Officer, and definitely not end users. With AppDynamics, no one has to tolerate slow performing apps ever again. AppDynamics customers include TiVo, AMICA Insurance, Expedia and StubHub.
Nov. 2, 2014 10:00 PM EST Reads: 3,010