@CloudExpo

How Memory Leaks Happen in a Java Application By Eugen Paraschiv Introduction to Memory Leaks In Java Apps One of the core benefits of Java is the JVM, which is an out-of-the-box memory management. Essentially, we can create objects and the Java Garbage Collector will take care of... (more)
Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here The App Architecture Revolution: Microservices, Containers and Automation In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effec... (more)
Serverless Machine Learning Operations Any startup has to have a clear go -to-market strategy from the beginning. Similarly, any data science project has to have a go to production strategy from its first days, so it could go beyond proof-of-concept. Machine learning and artific... (more)
We get it. If your company isn't up on blockchain, your future is doomed. At least, that's the general vibe industry leaders are putting out - scrambling to understand and utilize a framework that is more frequently associated with cryptocurrencies like bitcoin. In other words, b... (more)
Approyo CEO Chris Carter got a chance to sit down with Stefana Muller of Datagrid Systems at the recent Cloud Expo. Chris and Stefana discuss the state of the industry, DevOps, Cloud Computing, Big Data and more.... Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here SAP ... (more)
Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Why Composable Infrastructure Instead of HyperConvergence? HyperConvergence came to market with the objective of being simple, flexible and to help drive down operating expenses. It reduced the footprint by bundling the c... (more)
Register for Cloud Expo Silicon Valley by August 31 and Save $800! There is only one world-class Cloud event on earth, and that is Cloud Expo - which returns to Silicon Valley for the 21st Cloud Expo at the Santa Clara Convention Center, October 31 - November 2, 2017. Every Glob... (more)
Extend User Experience of WebRTC with Unique Sensor Devices WebRTC is great technology to build your own communication tools. It will be even more exciting experience it with advanced devices, such as a 360 Camera, 360 microphone, and a depth sensor camera. In his session at @Thi... (more)
How can an organization with decades worth of accumulated ERP customizations and configurations, IT systems and customized software applications digitally transform fast enough to keep up with the rapidly changing behaviors of digital customers? That is a hard question most organ... (more)
Horizontally Scaling Apps that Are Using Websocket Protocol With Cloud Foundry you can easily deploy and use apps utilizing websocket technology, but not everybody realizes that scaling them out is not that trivial. In his session at 21st Cloud Expo, Roman Swoszowski, CTO and VP... (more)
Total Cost of Ownership and the Cloud Adoption Lifecycle IT organizations are moving to the cloud in hopes to approve efficiency, increase agility and save money. Migrating workloads might seem like a simple task, but what many businesses don't realize is that application migrati... (more)
"With Digital Experience Monitoring what used to be a simple visit to a web page has exploded into app on phones, data from social media feeds, competitive benchmarking - these are all components that are only available because of some type of digital asset," explained Leo Vasil... (more)
Download Show Prospectus ▸ Here DevOps at Cloud Expo taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Must Wat... (more)
SYS-CON Events announced today that Secure Channels, a cybersecurity firm, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Secure Channels, Inc. offers several prod... (more)
WebRTC Potential for Edge Computing Scenarios Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human... (more)
Risk Tree API: Expose Your Vulnerabilities Vulnerability management is vital for large companies that need to secure containers across thousands of hosts, but many struggle to understand how exposed they are when they discover a new high security vulnerability. In his session at... (more)
Why Understanding Chaos Theory Is Important to Your Business “Chaos: When the present determines the future, but the approximate present does not approximately determine the future.” – Edward Lorenz We all probably remember the movie (“Jurassic Park”), even if we don’t remember ... (more)
The Five Key Elements to Build, Deploy and Operationalize Artificial Intelligence at Scale The question before companies today is not whether to become intelligent, it's a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simu... (more)
Digital technology innovations and advancements, and our adoption of them, have changed us. We are different consumers, employers and employees.  Our expectations have increased.  We have become mobile, impatient and demanding.  We are global. We demand immediate, accurate and re... (more)
API Security has finally entered our security zeitgeist. OWASP Top 10 2017 - RC1 recognized API Security as a first class citizen by adding it as number 10, or A-10 on its list of web application vulnerabilities. We believe this is just the start. The attack surface area offered... (more)
© 2008 SYS-CON Media