Welcome!

Cloud Expo Authors: Trevor Parsons, Liz McMillan, Michael Meiner, Pat Romanski, Yeshim Deniz

Related Topics: Linux, Cloud Expo

Linux: Press Release

RightScale Co-Founder & CTO to Speak at 4th Cloud Computing Expo

Thorsten von Eicken will review the definitions as well as the pros and cons of the different kinds of clouds

To date, cloud computing has by and large been in the realm of public clouds such as Amazon EC2, but there has been a lot of talk about other kinds of clouds, including "private" and "hybrid" clouds.

However, with these new choices comes added complexity and Thorsten von Eicken, Co-Founder & CTO of RightScale, will be trying to cut through that complexity at SYS-CON's 4th International Cloud Computing Conference & Expo, in a breakout session titled "My Cloud, Your Cloud, Our Cloud."

von Eicken ((pictured left talking on SYS-CON.TV to Cloud Computing Expo chairman Jeremy Geelan) will review the definitions as well as the pros and cons of the different kinds of clouds. He will provide guidance on when and how to use each, outlining the typical uses cases for public, private and hybrid clouds using real-world examples, including: Develop in public, deploy in private; Develop in private, deploy in public; Private core, public expansion; Some runs are public, some are private, some are in-between.

The event, co-located with the 7th International Virtualization Conference & Expo, is being held at the Santa Clara Convention Center, 2-4 November, 2009. As von Eicken's session will underline, we are in the midst of a revolutionary change in how applications are sold, delivered, deployed and managed.

Register Today and Save !
Sponsor and/or Exhibit Today
View Full Conference Schedule

Keynote & Breakout Session Speakers at the combined event at the Santa Clara Convention Center include:

DAY ONE - November 2, 2009
The Time is Right for Enterprise Cloud Computing
by Richard Marcello, President of Systems & Technology, Unisys

Up to now you may have been reluctant to move your Enterprise application workloads to the cloud, fearing a lack of security in the cloud, compliance issues such as data location regulations and having to rewrite your applications. During his keynote, Rich Marcello will discuss the latest technologies and approaches that help knock down these barriers, creating the opportunity for attendees to now consider cloud managed services as part of their data center journey to secure "IT as a Service".

DAY TWO: November 3, 2009
Cloud Computing Services at the Scale of the Internet
by Shelton Shugar, SVP Cloud Computing at Yahoo!

Yahoo! Cloud Services store and deliver web content, personalize content for consumers, optimize Ad selection and placement, improve search results, provide scalable virtual computing environments, and process and store enormous amounts of data to improve consumer experiences and drive innovation. This keynote will elaborate on how Yahoo! and consumers benefit from the Yahoo! Cloud Services that are in production today supporting web-serving properties and data processing environments.

DAY THREE: November 4, 2009
Cloud Computing: Separating Hype from Reality
by Richard Sarwal, SVP of Development for Oracle Enterprise Manager

Enterprises large and small are drawn by the advantages of cloud computing - pay-for-use, self-service, elastic scalability tegration, compliance, lock-in, and long term costs of public clouds. Private clouds for the exclusive use of one enterprise can mitigate these concerns by giving the enterprise greater control. This keynote will explore how enterprises are likely to adopt public and private cloud computing, building on a foundation of virtualization infrastructure and management systems.

My Cloud, Your Cloud, Our Cloud
Thorsten Von Eicken - Co-Founder & CTO, RightScale
– This session will provide guidance on when and how to use public, private and hybrid clouds, using real-world examples.

Shifting Clouds: How the Cloud Landscape is Evolving
Krishna Subramanian - Sr. Director Cloud Strategy, Sun Microsystems
– This session will provide a framework to classify the various cloud offerings, and will explore how solutions are evolving.

Hadoop @ Yahoo - Internet Scale Data Processing
Eric Baldeschwieler - VP Hadoop Software Development, Yahoo!
– This session will explain what the Yahoo! distribution of Hadoop is and how it benefits the larger cloud ecosystem, including major use-cases for Hadoop @ Yahoo!

Working with Big Data and Hadoop
Christophe Bisciglia - Co-Founder at Cloudera
– This session will highlight the technical and business issues that make Hadoop so powerful for large scale data processing.

Orchestration in the Cloud
Brian E. Boruff - VP of Cloud Computing & Software Services, CSC
– This session looks at how organizations with data and computing in the public and private cloud need to orchestrate processing, and recover the processing visibility necessary for the creation of digital trust.

Cloud Security - It's Nothing New; It Changes Everything!
Glenn Brunette - Chief Security Architect, Sun
–This session cuts through the hype and sharpens our focus on what security means for cloud computing and other elastic, hyper-scale architectures.

Developing Advantage: Platform Leverage in the Cloud
Peter Coffee - Director of Platforms, Salesforce
– This session will discuss alternative development experiences in various enterprise clouds and will highlight opportunities to combine their strengths in distinctive applications.

Cloud Management: What You Don't Know Can Hurt You
Stephen Elliott - Vice President of Strategy, CA
– This session will discuss what customers should consider when buying services from a cloud computing partner including the most important management processes and capabilities that matter to SLAs.

Security in the Cloud: Protecting Your Cloud Apps
Lars Ewe - CTO & VP of Engineering, Cenzic
–This session will address the Top 5 things you can do to protect your data and applications that run on the web and in the cloud and prevent security breaches.

Developing Successful Cloud Strategies By Evaluating Data Infrastructure Demands
Irfan Khan - CTO, Sybase
– This session will asses the various classes of applications (transactional, analytical, mobile) within your infrastructure and discuss how data infrastructure delivered as a service impacts business-critical information delivery.

Tactical Cloud Computing
Kevin Jackson - Vice President, Dataline

– This session will discuss the use of cloud computing technology and techniques for the support of localized and short-lived information access and processing requirements, including  Cloudbursting.

The Profit Model for Cloud Computing
Steve Lesem - President & CEO, Mezeo Software

–This session will examine why the concept of 'trust' is so essential and why it's the Cloud providers who have trusting relationships with customers that will triumph in the end.

Delivering Desktop Virtualization
Martin Ingram - Vice President of Product Strategy, AppSense

– This session will explore how by virtualizing hardware, applications and the user personality you can deliver a familiar working environment for users while simplifying management of the desktop estate.

Y! Scalable Storage and Delivery Services
Chuck Neerdaels - VP Content Storage, Delivery and Edge, Yahoo!
–This session will talk about Yahoo!'s Cloud Storage and Delivery stack and how it is purpose-built to solve the business and technical challenges of Internet-scale computing.

Cloud & SaaS Proponents: Know Your Enemies!
Louis Nauges - President, Revevol
–This session will discuss why so many CIOs and IT professionals think Cloud Comptuing and SaS is a threat to their careers and their power.

Negotiating the Virtual/Grid/Cloud Legal Minefield
David Snead - Attorney-at-Law, W. David Snead, P.C.
–This session will address the legal, business and marketing issues of involved in moving into Cloud services, and what anyone entering into a new contract, or marketing to end users needs to know.

Technologies for Virtualization-Based Desktop Management
Dr Monica Lam - Professor, Stanford University
–This session will describe a new approach to complete desktop management, allowing corporate IT to completely control the desktop including the operating system.

A Virtualization and Cloud Computing Security Fable
Christofer Hoff - Director, Cloud & Virtualization Solution, Cisco
–This session will discuss the realities of both Virtualization and Cloud Computing security and how to deal with the things that don't change and also the things that do profoundly.

Virtualizing Resources in Production Database Systems
Peter Thawley - Senior Director/Architect, Sybase
–This session will cover technical details behind virtualization techniques utilized in Enterprise database systems which go beyond server virtualization.

Trusted Computing for Virtualization Security
Steve Hanna - Co-Chair, Trusted Computing Group
–This session will address the Trusted Platform Module (TPM) which is included in virtually all enterprise PCs and many servers and how it can be used for virtualized security.

Policy Enforcement in the Virtualized Data Center
Hezi Moore - Sr. Founder & CTO, Reflex Systems
–This session will identify the top three challenges enterprises face when it comes to enforcing policies and outline best practices to control and audit change in policy rules across both the virtual and physical infrastructure.

Managing Sprawl and Self-Service for Virtual Machines
Scott Hammond - President & CEO, newScale
–This session will explain how to use a Service Catalog of standard options to enable self-service requests while enforcing pre-approved VM images, stop dates, and policy controls.

Cloud Computing as a Strategy: Enabling IT's Evolutionary Change
Tim Crawford - CIO & Vice President of Strategy, Vivo
– This session will deconstruct cloud computing into the true value proposition: enhanced flexibility and ultimate alignment with the business.

Cloud Computing Bootcamp
Alan Williamson - Editor-in-Chief, Cloud Computing Journal
– Williamson will be repeating (on November 3, 2009) his ever-popular all-day Cloud Computing Bootcamp, to which Golden Pass delegates receive free admission.

A New Role in the Cloud for a Tried and Tested Schemaless Database
Rob Tweed - Co-Founder & MD, M/Gateway
– This session will discuss how schemaless database technologies are now emerging as important and highly functional engines on which to build Cloud services.

Securing the Cloud and Establishing a Level of Trust
Tim Brown - VP & Security Architect, CA
– This session will address security needs for cloud computing, including all aspects of the cloud paradigm - Internal, Private, Public and Hybrid cloud environments.

Moving Your RIA Apps into the Cloud: 7 Challenges
Matias Bagini - CEO of JRapid Corp
|– This session will discuss the many challenges you will face if you want to move your RIA apps into the SaaS model including multitenancy, clustering, robustness, mashups, security, productivity and multi-browser programming.

Cannibalizing Google App Engine
Kevin Noonan - Software Developer , Calbane
– This session will show delegates how to use Google App Engine by dismembering its computing resources and consuming each of them them in isolation.

Yahoo! Cloud @ Internet Scale
Dekel Tankel - Director, Product Management, Yahoo!
– This session will describe the various cloud services offerings within Yahoo! and provide a glance for the company's exciting plans moving forward.

Revolutionizing Security Through Virtualization
Kevin Piper - Director of Technical Operations, Altor Networks
– This session will present case study examples shared of defense and civilian agencies that have virtualized their production environment with enterprise-call virtualization servers.

Bringing Cloud Computing Down to Earth with Ultra Low-Cost Endpoints
Stephen Dukker - Chairman & CEO, NComputing
– This session will examine how new-generation virtualization technologies have evolved and how companies are utilizing it to create new kinds of computing and services.

Top Infrastructure Headaches When Managing Applications in the Cloud
Javier Soltero - CTO of Management Products, SpringSource
– This session will address some of the biggest challenges in creating and launching successful web applications with little to no down time.

How the Delivery of Virtualization is Being Transformed
Simon Crosby - CTO, Citrix
– This session will provide IT organizations with a short- and long-term roadmap by focusing on the new delivery models for virtualization.

More Stories By Cloud News Desk

Cloud Computing News Desk brings the latest industry news related to the Cloud paradigm of massively scalable IT resources and capabilities delivered as a service using Internet technologies. For up to date news on the International Cloud Computing Conference & Expo series, the easiest way is to follow it on Twitter.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
Leysin American School is an exclusive, private boarding school located in Leysin, Switzerland. Leysin selected an OpenStack-powered, private cloud as a service to manage multiple applications and provide development environments for students across the institution. Seeking to meet rigid data sovereignty and data integrity requirements while offering flexible, on-demand cloud resources to users, Leysin identified OpenStack as the clear choice to round out the school's cloud strategy. Additional...
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud strategy and programs. In this Power Panel at 15th Cloud Expo (http://www.CloudComputingExpo.com...
We are all here because we are sold on the transformative promise of The Cloud. But what good is all of this ephemeral, on-demand infrastructure if your usage doesn't actually improve the agility and speed of your business? How must Operations adapt in order to avoid stifling your Cloud initiative? In his session at DevOps Summit, Damon Edwards, co-founder and managing partner of the DTO Solutions, will highlight the successful organizational, process, and tooling patterns of high-performing c...
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
Software-driven innovation is becoming a primary approach to how businesses create and deliver new value to customers. A survey of 400 business and IT executives by the IBM Institute for Business Value showed businesses that are more effective at software delivery are also more profitable than their peers nearly 70 percent of the time (1). DevOps provides a way for businesses to remain competitive, applying lean and agile principles to software development to speed the delivery of software that ...
Docker offers a new, lightweight approach to application portability. Applications are shipped using a common container format and managed with a high-level API. Their processes run within isolated namespaces that abstract the operating environment independently of the distribution, versions, network setup, and other details of this environment. This "containerization" has often been nicknamed "the new virtualization." But containers are more than lightweight virtual machines. Beyond their small...
The move in recent years to cloud computing services and architectures has added significant pace to the application development and deployment environment. When enterprise IT can spin up large computing instances in just minutes, developers can also design and deploy in small time frames that were unimaginable a few years ago. The consequent move toward lean, agile, and fast development leads to the need for the development and operations sides to work very closely together. Thus, DevOps become...
Cloud Expo 2014 TV commercials will feature @ThingsExpo, which was launched in June, 2014 at New York City's Javits Center as the largest 'Internet of Things' event in the world.

ARMONK, N.Y., Nov. 20, 2014 /PRNewswire/ --  IBM (NYSE: IBM) today announced that it is bringing a greater level of control, security and flexibility to cloud-based application development and delivery with a single-tenant version of Bluemix, IBM's

An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
Technology is enabling a new approach to collecting and using data. This approach, commonly referred to as the "Internet of Things" (IoT), enables businesses to use real-time data from all sorts of things including machines, devices and sensors to make better decisions, improve customer service, and lower the risk in the creation of new revenue opportunities. In his General Session at Internet of @ThingsExpo, Dave Wagstaff, Vice President and Chief Architect at BSQUARE Corporation, discuss the ...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
"BSQUARE is in the business of selling software solutions for smart connected devices. It's obvious that IoT has moved from being a technology to being a fundamental part of business, and in the last 18 months people have said let's figure out how to do it and let's put some focus on it, " explained Dave Wagstaff, VP & Chief Architect, at BSQUARE Corporation, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
Verizon Enterprise Solutions is simplifying the cloud-purchasing experience for its clients, with the launch of Verizon Cloud Marketplace, a key foundational component of the company's robust ecosystem of enterprise-class technologies. The online storefront will initially feature pre-built cloud-based services from AppDynamics, Hitachi Data Systems, Juniper Networks, PfSense and Tervela. Available globally to enterprises using Verizon Cloud, Verizon Cloud Marketplace provides a one-stop shop fo...
"Our premise is Docker is not enough. That's not a bad thing - we actually love Docker. At ActiveState all our products are based on open source technology and Docker is an up-and-coming piece of open source technology," explained Bart Copeland, President & CEO of ActiveState Software, in this SYS-CON.tv interview at DevOps Summit at Cloud Expo®, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
Infor has announced a new feature Infor CloudSuite™ Aerospace & Defense (A&D) to aid compliance with International Traffic in Arms Regulations (ITAR). The ITAR function will serve as a complementary function for new or existing Infor CloudSuite A&D customers, to facilitate compliance for Infor customers that are creating a US defense article or performing a US defense service and wish to benefit from cloud-services. The ITAR regulation serves to manage handling and access requirements for dat...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...