|By Marketwired .||
|May 14, 2014 12:01 AM EDT||
RYE BROOK, NY -- (Marketwired) -- 05/14/14 --
Ms. Jody Ross, Vice President of Business Development, AMAG Technology, told us, "AMAG's Symmetry access control system is the best software on the market today. Our software and hardware come packed with features that other manufacturers charge for. The GUI is similar to Microsoft's so it's familiar to everyone, reducing training time, and it integrates to a wide variety of technology partners to provide video, audio, HR, etc. options to customers who need those options. Innovative features such as Alarm Workflow, Task Manager and Threat Level Manager allow security directors to better manage their security team's response times and actions, and secure their building during crisis situations. Symmetry is a leading-edge security system designed for buildings of any kind, which combines all aspects of security into a single well-designed and future-proof software solution suitable for small, large or very large applications."
For the complete interview with Jody Ross: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_JodyRoss.html
For more information www.AMAG.com and please see the following links:
About AMAG: http://www.amag.com/About-AMAG-Technology.aspx
AMAG Products: http://www.amag.com/Products.aspx
AMAG Solutions: http://www.amag.com/solutions.aspx
AMAG Services & Support: http://www.amag.com/Support.aspx
AMAG Partners: http://www.amag.com/area-of-interest.aspx
AMAG Case Studies: http://www.amag.com/Case-Studies.aspx
AMAG Resources: http://www.amag.com/library.aspx
AMAG News: http://www.amag.com/library/News.aspx
HP Enterprise Services
Mr. John Felker, Director, Cyber and Intelligence Strategy, HP Enterprise Services, U.S. Public Sector, told us, "HP takes an enterprise view of security which, in turn, helps our clients overcome the limitations typically associated with historical and siloed views of risk mitigation, globalized security and cost reductions. With the increased deployment of digital technologies, frequently operated remotely and unmanned, comes the need for increased cyber- and physical security for critical assets such as SCADA systems. At HP, we don't simply improve your security posture to address threats and manage risk and compliance, we also bring to bear an array of services, solutions and industry-leading technology to ensure you maintain a proactive, mature and agile security posture designed to navigate through ever-evolving threat and regulatory landscapes. By leveraging cloud, big data and mobility initiatives, you can evolve into a more proactive operating model which will increase productivity, optimize resource utilization and help you build and maintain safe, secure and environmentally sound operations."
For the complete interview with John Felker: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_HP_JohnFelker.html
For more information on these topics:
Risk Management and Compliance for US Public Sector (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1087503#.UvHmo7S6mJE)
Cybersecurity for U.S. Public Sector (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1087497)
Public Sector Services and Solutions (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1131347)
ImageWare Systems, Inc. (OTCQB: IWSY) (ImageWare), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, has issued financial results for the first quarter ended March 31, 2014, as well as provided a corporate update to highlight the company's progress since its last update on March 17, 2014.
- Partnered with IBM to provide Imageware's cloud-based, multi-modal biometric identity management and user authentication platform on the IBM Cloud Platform, BlueMix.
- Signed agreement to provide ImageWare's GoMobile Interactive product via Fujitsu's Global Cloud Platform with Maxie Mobile for their mobile wallet offering, initially targeted towards the gaming industry.
- T-Systems and ImageWare have secured the first customer under the new partnership. The first customer is Deutsche Bahn, the German national rail company. ImageWare expects this implementation to commence and begin producing revenues in the third quarter of 2014.
First Quarter 2014 Financial Results
Total revenues in the first quarter of 2014 increased to $1.1 million from $0.9 million in the first quarter of 2013, primarily due to higher sales of identification software license revenue.
Gross margin in the first quarter of 2014 increased by 410 basis points to 76.4% compared to 72.3% in the first quarter of 2013. The increase was primarily due to the increased software license revenues.
Net loss in the first quarter of 2014 was $1.7 million or ($0.02) per basic share, compared to a net loss of $2.8 million or ($0.04) per basic share in the first quarter of 2013.
At March 31, 2014, cash and cash equivalents totaled $2.2 million compared to $2.4 million at December 31, 2013. The company continues to carry virtually no debt and its $3.5 million line of credit that remains untapped.
"Our strategy to target large IT service providers and provide security for their cloud customers and applications is gaining traction, as demonstrated by our most recent partnership with IBM," said Jim Miller, chairman and CEO of ImageWare. "IBM marks our third secured agreement with a major cloud partner, and we expect more to come. These large, established partners offer the support, brand name and worldwide cloud platform needed to seamlessly distribute our products. While IBM's BlueMix is in the early stages, we've already received referrals from their customers -- several of which we are in active discussions.
"At the beginning of April, Fujitsu announced the kick-off and worldwide expansion of our partnership model with a dedicated sales team covering the Americas. Since then, Fujitsu has set up proof of concept pilots with three of their major customers, with more expected in the near future.
"By working closely with our technology partners, we continue to build a healthy active pipeline of potential customers. One includes a new partnership with Maxie Mobile, where we will provide our GoMobile Interactive product via Fujitsu's Global Cloud Platform for Maxie's mobile wallet offering, which is initially targeted towards the gaming industry.
"Our partnership with T-Systems continues to progress quickly. In fact, T-Systems has recently secured an agreement with Deutsche Bahn, the German national railroad, who will become the first customer receiving our joint product offering. We expect more to follow and anticipate this agreement will begin producing revenues in the third quarter of 2014.
"We see our relationships with IBM, Fujitsu, T-Systems and others representing just the tip of the iceberg in terms of our opportunities in the commercial and consumer marketplaces. All of these partnerships are progressing well, and although they have not yet produced revenue, there is every indication that the steps we have been taking are building shareholder value and will ultimately provide a steady stream of recurring revenue."
For more information:
IWS CloudID: http://iwsinc.com/products/next-generation-iws-cloudid-product-suite/
ImageWare Systems Solutions: http://www.iwsinc.com/markets/overview
ImageWare Systems Products: http://www.iwsinc.com/products/overview2
For ImageWare Systems Investors: http://www.iwsinc.com/about-iws/investors/overview1
For more information: www.iwsinc.com
March Networks® recently announced that...
And, in other recent news...
March Networks®, a global provider of intelligent IP video solutions, today announced that America's largest wine and spirits superstore Total Wine & More has standardized on its next-generation retail video surveillance solution. The privately-owned chain is using the March Networks offering to maintain its strong security and loss prevention efforts across 100 outlets located in 15 states, and to capture clear video evidence to assist with liability protection as it grows its e-commerce business.
Total Wine, which is adding 12-15 new stores annually, transitioned to the March Networks 8000 Series Hybrid NVRs and Visual Intelligence software when it began opening Internet fulfilment centers in its stores. The 25,000-square-foot retail outlets hold nearly 14,000 types of wines, beers and spirits and feature walk-in cigar humidors and keg rooms, wine tasting areas and classrooms. While existing analog cameras are in place to monitor the stores' public areas, Total Wine needed high-definition (HD) IP cameras to capture essential data when packaging bottles that could retail for up to $2,000. The 8000 Series recorders can support a mix of analog and IP cameras or as many as 32 IP cameras, giving Total Wine the freedom to transition to HD video cost-effectively as its business requirements evolve.
"We didn't want to abandon our analog cameras, and the March Networks solution allowed us to add more IP cameras to our build-out where and when we needed them," said Total Wine Senior Project Manager Mark Ganter. "We're very happy with the solution and the support we have received. We have such vast coverage that we can see almost every part of a store, and we now use the video surveillance system if we need to investigate a problem or inspect an area in any of our stores."
Total Wine operates mini-fulfillment centers within select stores, where product is pulled from the shelves, packaged and shipped to customers by courier. IP cameras in the fulfillment rooms capture images of the bottles, shipping information and labels for proof of packaging and delivery. Additional IP cameras are positioned to capture the pickup by the courier, at which time all liability transfers to the courier. If the need arises, Total Wine can review its video archives to retrace the steps of the fulfillment process and verify exact details.
The high-performance March Networks 8000 Series Hybrid NVRs provide the retailer with unparalleled reliability and scale, centralized system management and the ability to remotely access live and recorded video. In the future, Total Wine may also take advantage of video analytics and software applications available in the March Networks retail portfolio for expanded loss prevention, operations and marketing intelligence.
"Our experience working with some of the world's largest retailers has resulted in our next-generation offering, which is ideally suited to help organizations like Total Wine & More protect and grow their business and optimize operations," said Net Payne, Chief Marketing Officer, March Networks. "Retailers are using video-based intelligence to better protect assets, prevent losses, enhance security and increase profits in the process. The technology is now considered a competitive advantage rather than just a security system."
For more information, please visit the March Networks News Center
StrikeForce Technologies, Inc. (OTCQB: SFOR), a company that specializes in Cyber Security for the prevention of Identity Theft and Data Breaches, announced today that it has been granted its third patent for "Multi-Channel Device Utilizing A Centralized Out-of-Band Authentication System" from the United States Patent Office (Patent No. 8,713,701).
"Being awarded this third patent and with one pending for Out-of-Band Authentication is a big win with great timing for StrikeForce," said Mark L. Kay, CEO. "The mobile claims covering mobile authentication applications further strengthens our sales position, while Cyber Security has become the #1 security issue for banks, health care providers, law firms, insurance companies and many others; as well as in our continuing efforts to enforce our patents through licensing and litigation against potential infringers such as Phone Factor and First Midwest Bancorp for starters."
According to research firm IDC, employee-owned smart phones accounted for more than 50% of business smart phones sold in 2013. According to Forrester's 2013 Mobile Workforce Adoption Trends report published February 4th, 2013, "BYOD includes the 258 million global information workers who chose their own laptop and also the 129 million workers who paid for a smartphone for work."
"We are very excited about this extensive market opportunity that our ProtectID® Out-of-Band Multi-Factor Authentication product provides for mobile devices. ProtectID is perfectly positioned at the intersection of the hottest three trends, Mobility (e.g. iPhone, BlackBerry and Android devices), Cloud Computing (e.g. Google & Salesforce) and the Steep Rise of Security Threats (Man in the Middle Attacks, etc.) as shown with some of our new clients and distributors," says Kay. Our Patented ProtectID Out-of-Band Mobile Authentication Technology can be used for the following:
- Secures access to Social Networking websites i.e. Facebook, Twitter, YouTube, etc.
- Protects online banking access
- Protects online healthcare access by all, now required
- Protects Remote Access for employees, meets 2-Factor Authentication compliance
- Government - Protects critical infrastructure and citizens against cyber attacks
For more information about:
www.strikeforcetech.com; (OTCQB: SFOR)
SYS-CON Events Announces Cloud Expo 2014 New York
14th International Cloud Expo to take place June 10-12, 2014, at the Javits Center in New York City
SYS-CON Events announced today that 14th Cloud Expo®, co-located with 5th Big Data Expo, 3rd SDDC Expo, 2nd DevOps Summit, 2nd WebRTC Summit, and 1st Things Expo, will take place June 10-12, 2014, at the Javits Center in New York City.
The three-day event will offer a vast selection of technical and strategic breakout sessions, General Sessions, Industry Keynotes, and "Power Panels" from a rock star conference faculty chosen from among the leading industry players in the cloud computing and Big Data worlds. The bustling Expo Floor will include two busy Demo Theaters so that as a delegate you can kick the tires of solutions and offerings, and discuss one-on-one with all the leading Cloud and Big Data players what they are offering and how to make use of it in your particular situation.
All the main layers of the Cloud ecosystem will be represented -- the infrastructure players, the platform providers, and those offering applications. The high-energy event is a must-attend for senior technologists from CEOs on down -- including CIOs, CTOs, directors of infrastructure, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, and communications and networking specialists.
Cyber Intelligence USA
18th June 2014 - 20th June 2014
Intelligence-Sec presents to you our upcoming Cyber Intelligence USA will be hosted in the Le Meridien Hotel in Arlington, Virginia from the 18th - 20th June 2014 with our "Official Partner" the Centre for Strategic Cyberspace & Security Science (CSCSS) this is truly a not to be missed event.
CyberCrime is a major worldwide concern for many government departments. The event will also provide an international perspective allowing attendees to hear how other nations are protecting their critical infrastructure / cyberspace.
Cyber USA will bring together senior government and law enforcement officials to discuss the latest cybercrimes that have taken place and the emerging cyber threat that are developing. Attendees will have the opportunity to hear in depth presentations from the U.S Air Force, National Security Agency (NSA), NASA, U.S Department of Defense, NYPD Computer Crimes Squad, Russian Law Enforcement Agency and many presentations from senior decision makers within the Cyber industry.
To take part in this event either as a speaker, sponsor, exhibitor or as a delegate please feel free to contact us at [email protected] or +44 (0)1582 346 706. For more details information on the event visit us at www.intelligence-sec.com/events/cyber-intelligence-usa or contact us at [email protected].
The Cyber Security Summit is an exclusive conference series connecting Senior Executives responsible for protecting their companies' critical infrastructures with cutting-edge technology providers and renowned information security experts. The one day event will focus on educating attendees on how to best protect their highly vulnerable business applications, intellectual property and discover the latest products and services for enterprise cyber defense.
WHEN: Thursday, June 5th 2014 - 8am-5pm at The Sheraton Premiere in Tysons Corner, VA
Limited tickets are available! Use code "SSW2014" for 50% OFF Full Conference passes. To register visit: www.CyberSummitUSA.com
Special Lunch Briefing Presentation by Governor Terry McAuliffe, 72nd Governor of Virginia.
Renowned Security Expert Speakers From: AirPatrol, BAE Systems, BlackBerry, CGI Federal, Convergence Technology Consulting, CSC Global Cybersecurity, Cylance, Department of Homeland Security, Exelis, FireEye, General Dynamics Advanced Information Systems, Hexis Cyber Solutions, Lockheed Martin Information Systems, McAfee, National Security Agency, Novetta, Nubo Software, PhishMe, Raytheon Cyber Products, SINET, The Chertoff Group, ThreatTrack Security, Trend Micro, Tripwire, Triumfant, United States, Department of Defense, Vormetric, ZeroFOX & more.
Panel Discussions Will Cover: Cyber Security Market Forecast & Emerging M&A Trends, Insider Threats, Enterprise Mobile Security & BYOD, Cyber Policy, Cyber Defense & more.
For a full list of exhibiting sponsors, speakers and event agenda visit: www.CyberSummitUSA.com
For 37 years FOSE has served as the nation's premier event for government technology professionals seeking tools and best practices to equip their agency for the 21st century. From policy updates -- straight from the Hill -- and exclusive insights from today's leading authorities, to the most comprehensive showcase of technology in action -- it's all at FOSE.
FOSE's three-day conference addresses the most relevant and pressing technology and management priorities and issues for government and its private sector partners. With more than 60 sessions including keynotes, panel discussions and in-depth technical sessions, you can expect to take home best practices, policy updates and detailed guidance across 8 in-demand tracks.
GovSec 2014 Conference & Free Expo
Experience the Largest, Most Dynamic Government Security Expo in Washington, DC, May 13-14, FREE. Discover the newest trends, cutting-edge technology, tools, equipment and the exciting companies who provide them in the exhibit hall.
Plus, get valuable training to enhance your career without straining your budget at the full conference -- with conference prices starting at $99, you won't want to miss out!
GovSec resource trusted by thousands of security professionals and is the nation's premier event for government, homeland security, and law enforcement!
Get more information and register for the full conference or free expo today -- SecuritySolutionsWatch.com Readers save 10% on conference prices! Use code: PMG02 @ www.GovSecInfo.com.
June 17-19, 2014
If you're looking focused content, features and leading suppliers catering for every security requirement, IFSEC International in London is the only destination for you this June! With a global focus on expertise and guidance, you'll discover high level security content that covers both public and private security, from SMEs to the largest enterprises. An international gathering of over 28,000 professionals, the event is the key forum in which to meet with the manufacturers leading the way in security innovation, including Axis, Samsung, ASSA Abloy, Canon and many more.
If you're a trade visitor, take the opportunity to network with the potential clients with live projects, while sourcing your full range of kit on the show floor. If you're an end user, attend to meet the installers, integrators and consultants who can steer you towards an increasingly successful security strategy.
Register free of charge at www.ifsec.co.uk/register
For more information about:
IFSEC Community: http://www.ifsecglobal.com/
IFSEC Directory: http://www.ifsecglobal.com/
IFSEC Events: http://www.ifsecglobal.com/events/
LinuxCon North America
August 20-22, 2014
LinuxCon is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.
Congress Centre Düsseldorf
October 13 - 15, 2014
LinuxCon Europe is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.
SDW 2014 - Exhibition sold out and exceeding all expectations
With still more than 4 months to go to SDW 2014, the SDW Exhibition has completely sold out, beating all previous records for the event. Some 103 companies have signed up to participate at the world's leading event for next-generation human identity and secure credential solutions, and a waiting list is in operation.
A full list of exhibiting companies can be viewed at: http://www.sdw2014.com/exhibitors/
Entry to the exhibition is free to registered visitors, and all visitors pre-registering before 9th May 2014 will be upgraded to Visitor Plus+ status and be entered into the SDW Conference Delegate draw with the chance of winning a free delegate pass to SDW 2014. In addition, they will receive a complimentary £ 5.00 catering voucher to use at the show.
Pre-registration can be completed at: http://www.sdw2014.com/visitor-registration
Delegates from government departments in Asia, Africa and Latin America can access the entire three day event, including the conference and exhibition for just £ 399 +VAT. Government attendees from other world regions can register for £ 499 +VAT (Rate expires 28th February 2014.) Plus, for multiple registrations for every government delegate registered, the second is at half price.
In addition, for 2014, all conference sessions will have simultaneous translation into French and Spanish.
Industry delegates are also able to attend the SDW 2014 conference at a discounted rate. The show operates a limited-availability, stepped pricing policy, meaning that delegates who book early access the lowest rates. Delegates can register online at: http://www.sdw2014.com/delegate-booking
Diary Date - SDW 2014, 16-18 June 2014, Queen Elizabeth II Conference Centre, London, UK
2014 SIA Government Summit
Hosted by the Security Association (SIA)
June 3-4, 2014
W Hotel in Washington, D.C.
The SIA Government Summit brings together all facets of the security industry: executives, integrators, sales, marketing and government relations professionals. Panels are geared towards doing business with government and gaining a better understanding of the trends facing the industry, and the event provides one-on-one networking time with government and private sector insiders.
Dr. Reginald Brothers, Under Secretary for Science and Technology, U.S. Department of Homeland Security, has been confirmed as a keynote speaker at the Security Industry Association (SIA) Government Summit.
Dr. Brothers was confirmed by the U.S. Senate on April 7, and is responsible for the long-term strategic direction of the Department's S&T programs, including basic and applied research, development, demonstration, testing and evaluation of technologies that will help DHS and the nation's first responders effectively achieve their missions.
US/Canada Border Conference
Cobo Center, Detroit, MI
September 16-17, 2014
Beyond the Border 2.0
The US/Canada Border Conference will bring together local, state, provincial and federal agencies, as well as business organizations, in a central location convenient to both nations, to advance the "Beyond the Border" Action Plan between the United States and Canada.
Government and industry leaders share their knowledge and thoughts at a conference designed to enlighten, inform and educate the audience on the complex challenges outlined in the bi-lateral plan. The program advances the mission by providing a forum that helps foster collaboration while gaining a better understanding of the political, infrastructure and technological needs in the combat against current and future security threats, while improving the efficient flow of legal cross-border activity
Sponsors will attend all keynotes, panel sessions and food functions and have the unique opportunity to meet face-to-face with border security leadership from both the US and Canada.
Contact: John Moriarty, [email protected], 203-822-7953
WORLD SMART WEEK
Chip-to-Cloud Security Forum
Advances in Securing Embedded, Mobile & Cloud Services and Ecosystems
Conference Sept. 23-25 & Exhibition Sept. 22-24, 2014 - Marseille Provence, France
Chip-to-Cloud Security Forum provides an independent collaboration and information-sharing platform dedicated to advance end-to-end digital security. Created from the former e-Smart and Smart Mobility conferences, its wide-ranging technical conference covers four key themes: embedded security, security & mobility, M2M & IoT security and secure cloud applications. The full digital security value chain will attend, with 300 expected attendees from Academia and Industry. Part of World Smart Week (1700 participants), the Forum offers great networking and forward-thinking opportunities with the attendees of the three co-located conferences dedicated to contactless/mobile, e-ID and M2M services and also includes a 50-booth exhibition. Visit us online at www.chip-to-cloud.com
M2M Innovation World Congress
Smart Services for Vertical Markets
Conference & Exhibition Sept. 22-24, 2014 - Marseille Provence, France
M2M Innovation World Congress invites all the M2M stakeholders to shift from a technology-driven to a business- and user-centric approach. Focused on emerging business models, technologies and best practices, this conference & exhibition gives its participants new inspirations to innovate and setup business while meeting prominent figures both from M2M industry and verticals. The conference will explore in particular M2M innovations in Smart Grids, Smart Cities, Retail and Consumer Electronics. Held in conjunction with the three other smart devices-related conferences and 50-booth exhibition forming World Smart Week, the Congress provides its 300 attendees rich opportunities to network, share knowledge and develop business with 1700 participants overall. Visit us online: www.m2minnovationworldcongress.com
NFC World Congress
Mobile Proximity: Innovation, Services & Business
Conference & Exhibition September 22-24, 2014 - Marseille Provence, France
Now in its 4th edition, NFC World Congress explores the emerging ways to interact with the digital world through NFC and related mobile proximity technologies.
From start-ups to leading IT/mobile players and implementers from verticals, its conference gathers 600 participants from 60 countries eager to advance mobile proximity business in all its applications. Within World Smart Week, the Congress benefits from synergies of contents with three co-located conferences and a 50-booth joint exhibition. 1700 participants overall will converge at this global meeting of contactless/mobile, e-ID, M2M and digital security industries. Visit the Congress online: http://www.nfcworldcongress.com
World e-ID Congress
Identity services for Government, Mobility & Enterprise
Conference Sept. 23-25 & Exhibition Sept. 22-24, 2014 - Marseille Provence, France
Since 2004 World e-ID gathers e-ID programs managers, government officials and technology experts around world's most inspiring large scale rollouts and latest innovations. Over 400 delegates from 60 countries are expected in 2014. Among the conference highlights: mobile ID advances, emerging countries and EU projects' latest results, cyber-security policies, e-ID for banking... Its 50-booth exhibition, featuring e-ID solutions leaders, will add knowledge sharing and networking opportunities with the mobile/contactless, M2M and digital security professionals attending World Smart Week (1700 participants overall). Visit the Congress online: http://worlde-idcongress.com
By using our website and any information located at www.SecuritySolutionsWatch.com you agree to these "Terms."
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how business and development users can collaborate – each using tools appropriate to their expertise – to buil...
Oct. 9, 2015 02:00 AM EDT Reads: 278
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction. The problem is there are a lot of moving parts in these designs; this makes assuring performance co...
Oct. 9, 2015 02:00 AM EDT Reads: 209
In his session at DevOps Summit, Bryan Cantrill, CTO at Joyent, will demonstrate a third path: containers on multi-tenant bare metal that maximizes performance, security, and networking connectivity.
Oct. 9, 2015 01:00 AM EDT Reads: 129
JFrog has announced a powerful technology for managing software packages from development into production. JFrog Artifactory 4 represents disruptive innovation in its groundbreaking ability to help development and DevOps teams deliver increasingly complex solutions on ever-shorter deadlines across multiple platforms JFrog Artifactory 4 establishes a new category – the Universal Artifact Repository – that reflects JFrog's unique commitment to enable faster software releases through the first platform-agnostic approach to storing and sharing binary artifacts.
Oct. 9, 2015 12:30 AM EDT Reads: 630
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Oct. 9, 2015 12:00 AM EDT Reads: 219
Chris Van Tuin, Chief Technologist for the Western US at Red Hat, has over 20 years of experience in IT and Software. Since joining Red Hat in 2005, he has been architecting solutions for strategic customers and partners with a focus on emerging technologies including IaaS, PaaS, and DevOps. He started his career at Intel in IT and Managed Hosting followed by leadership roles in services and sales engineering at Loudcloud and Linux startups.
Oct. 8, 2015 10:30 PM EDT Reads: 193
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.
Oct. 8, 2015 10:00 PM EDT Reads: 590
The last decade was about virtual machines, but the next one is about containers. Containers enable a service to run on any host at any time. Traditional tools are starting to show cracks because they were not designed for this level of application portability. Now is the time to look at new ways to deploy and manage applications at scale. In his session at @DevOpsSummit, Brian “Redbeard” Harrington, a principal architect at CoreOS, will examine how CoreOS helps teams run in production. Attendees will understand how different components work together to solve the problems to manage applicatio...
Oct. 8, 2015 09:45 PM EDT Reads: 1,253
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and live demonstrations of each method. Special emphasis will be put on sysdig, an open source troubleshoo...
Oct. 8, 2015 09:30 PM EDT Reads: 213
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevOps principles.
Oct. 8, 2015 09:30 PM EDT Reads: 235
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Oct. 8, 2015 09:15 PM EDT Reads: 227
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Oct. 8, 2015 09:00 PM EDT Reads: 1,093
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approach. NoOps enables developers to deploy, manage, and scale their own code, creating an infrastructure...
Oct. 8, 2015 06:00 PM EDT Reads: 141
DevOps is gaining traction in the federal government – and for good reasons. Heightened user expectations are pushing IT organizations to accelerate application development and support more innovation. At the same time, budgetary constraints require that agencies find ways to decrease the cost of developing, maintaining, and running applications. IT now faces a daunting task: do more and react faster than ever before – all with fewer resources.
Oct. 8, 2015 06:00 PM EDT Reads: 379
In their session at DevOps Summit, Asaf Yigal, co-founder and the VP of Product at Logz.io, and Tomer Levy, co-founder and CEO of Logz.io, will explore the entire process that they have undergone – through research, benchmarking, implementation, optimization, and customer success – in developing a processing engine that can handle petabytes of data. They will also discuss the requirements of such an engine in terms of scalability, resilience, security, and availability along with how the architecture accomplishes these requirements. Lastly, they will review the gory details of the technolo...
Oct. 8, 2015 05:00 PM EDT Reads: 399
DevOps has often been described in terms of CAMS: Culture, Automation, Measuring, Sharing. While we’ve seen a lot of focus on the “A” and even on the “M”, there are very few examples of why the “C" is equally important in the DevOps equation. In her session at @DevOps Summit, Lori MacVittie, of F5 Networks, will explore HTTP/1 and HTTP/2 along with Microservices to illustrate why a collaborative culture between Dev, Ops, and the Network is critical to ensuring success.
Oct. 8, 2015 04:45 PM EDT Reads: 133
Saviynt Inc. has announced the availability of the next release of Saviynt for AWS. The comprehensive security and compliance solution provides a Command-and-Control center to gain visibility into risks in AWS, enforce real-time protection of critical workloads as well as data and automate access life-cycle governance. The solution enables AWS customers to meet their compliance mandates such as ITAR, SOX, PCI, etc. by including an extensive risk and controls library to detect known threats and behavior and usage analytics to identify unknown risks.
Oct. 8, 2015 03:00 PM EDT Reads: 209
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud without worrying about any lock-in fears. In fact by having standard APIs for IaaS would help PaaS expl...
Oct. 8, 2015 02:30 PM EDT Reads: 652
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Oct. 8, 2015 02:00 PM EDT Reads: 339
As a company adopts a DevOps approach to software development, what are key things that both the Dev and Ops side of the business must keep in mind to ensure effective continuous delivery? In his session at DevOps Summit, Mark Hydar, Head of DevOps, Ericsson TV Platforms, will share best practices and provide helpful tips for Ops teams to adopt an open line of communication with the development side of the house to ensure success between the two sides.
Oct. 8, 2015 12:00 PM EDT Reads: 576
For almost two decades, businesses have discovered great opportunities to engage with customers and even expand revenue through digital systems, including web and mobile applications. Yet, even now, the conversation between the business and the technologists that deliver these systems is strained, in large part due to misaligned objectives. In his session at DevOps Summit, James Urquhart, Senior Vice President of Performance Analytics at SOASTA, Inc., will discuss how measuring user outcomes – including how the performance, flow and content of your digital systems affects those outcomes – ca...
Oct. 8, 2015 12:00 PM EDT Reads: 436
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
Oct. 8, 2015 11:00 AM EDT Reads: 728
Clutch is now a Docker Authorized Consulting Partner, having completed Docker's certification course on the "Docker Accelerator for CI Engagements." More info about Clutch's success implementing Docker can be found here. Docker is an open platform for developers and system administrators to build, ship and run distributed applications. With Docker, IT organizations shrink application delivery from months to minutes, frictionlessly move workloads between data centers and the cloud and achieve 20x greater efficiency in their use of computing resources. Inspired by an active community and trans...
Oct. 8, 2015 10:45 AM EDT Reads: 493
Enterprises can achieve rigorous IT security as well as improved DevOps practices and Cloud economics by taking a new, cloud-native approach to application delivery. Because the attack surface for cloud applications is dramatically different than for highly controlled data centers, a disciplined and multi-layered approach that spans all of your processes, staff, vendors and technologies is required. This may sound expensive and time consuming to achieve as you plan how to move selected applications to the cloud, but smart organizations are actually reporting an improved security posture, accel...
Oct. 8, 2015 05:00 AM EDT Reads: 694
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services and command line interfaces creates context-switching that slows productivity, efficiency, and may le...
Oct. 8, 2015 04:00 AM EDT Reads: 485