|By Marketwired .||
|December 11, 2012 12:01 AM EST||
RYE BROOK, NY -- (Marketwire) -- 12/11/12 -- ImageWare Systems (OTCQB: IWSY), Wave Systems (NASDAQ: WAVX)
Mrs. Ulrica de-Fort Menares, Director of Product Management for Cisco Medianet, told us, "An intelligent network must become more application-savvy. It must have the ability to determine the importance of a session based on its business value, and treat the session accordingly, end to end. One of the key medianet characteristics is its ability to become media-aware. Imagine this: The network can discover the type of endpoint and automatically configure the switch port for that type of device. This ability to plug and play any endpoint in the network is an example of tight integration between an intelligent network and an endpoint."
For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_Cisco_UFM.html
Videx, Inc., announced a new version of the CyberKey Vault 20, the CyberKey Vault 20 FX. The redesign features a sleek new look with weatherized input modules and an embedded Flex System Hub for improved performance, all offered at a new, lower price.
"The CyberKey Vault 20 FX is our most advanced key control cabinet (http://www.videx.com/cyberkey-vaults.html) yet," said James McGowan, VP of Sales and Marketing at Videx. "We built on the award winning original design and added extra durability and speed to meet the needs of today's demanding end-users. We believe it will surpass market expectations."
The Vault 20 FX is an intelligent key cabinet designed to manage, program, and dispense CyberKey smart keys. The keys are stored unprogrammed and locked securely in the cabinet until an RFID card and/or PIN code is presented to the cabinet. After reading the card and/or accepting the PIN, the CyberKey Vault programs a CyberKey with the individual's permissions. Keys are programmed with access privileges for each user, detailing which electronic locks (http://www.videx.com/cyberlock_cylinders.html) it can open and when. An audit record of all events is stored in both the locks and the keys. Each time a key is used at a lock, a record of the lock ID, date, and time is stored in the key, and a record of the key ID, date, and time is stored in the lock.
CyberKeys feature a unique electronic ID, preventing duplication. Although two keys can be programmed alike, each one leaves its own unique record within the system. When the key is returned to the Vault, the Vault downloads the key's audit trail, removes its permissions, and begins charging the key.
Videx offers three robust smart key vaults: CyberKey Vault 1, CyberKey Vault 20 FX, and CyberKey Vault WR. To learn more about the CyberLock line of access control (http://www.videx.com/cyberlock_overview.html) products, please visit our website at www.cyberlock.com.
For more information about CyberLock products: http://www.cyberlock.com/cyberlock_products.html.
For the complete interview with Mr. James McGowan, V.P. of Sales and Marketing, Videx:
For CyberLock News & Events:
For the CyberLock Solutions Center:
For more information:
Dove Net Technologies
Mr. Tony Nasca, Dove Net Technologies, said, "The Project System is the Complete Business Computer System for Contractors and Integrators. Companies that install: sound systems, nurse call systems, fire alarm systems, computer cabling, burglar systems, cctv, video systems, and systems contracting in general. Other companies that are using Project include Video Wholesale Distributors, Audio Visual Specialists, Video & Film Duplicators, Telephone System Specialists, and more". The major benefit that The Project System brings to the table is the that The Project System has been written in such a way that the software understands the business needs of these different industries and provide tools and feature sets to aid the contractor in running his business better. The most important aspect of The Project System is that The Project System provides a process flow to organize the company so that there is a standard process for quotes using Dove Net supplied Manufacturers Price Lists. You can also import your own price lists into The Project System."
For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_DNT.html
Dove Net Clients Rave About The Project System: http://www.dovenet.com/clients.htm
For a Dove Net Demo: http://www.dovenet.com/project2.htm
For more information about The Project System: http://www.dovenet.com/projectwin.htm
For more information: www.DoveNet.com
ImageWare Systems recently announced, "In addition to product development, ImageWare has been preparing for a major international deployment as the exclusive provider of biometric identity management for a prime contractor installing cargo scanning security at the Republic of Ecuador's major seaports. The initial deployment is currently scheduled to begin in the early part of 2013 at the Port of Guayaquil, the country's main seaport that handles a majority of its imports and exports. ImageWare expects to receive a fee for every port worker receiving credentials, as well as an annual management and maintenance fee, based on a percentage of the initial credentialing cost per worker. Depending upon the number of enrollees, the company expects the contract value to exceed $3.0 million over its seven year term.
"The high-end biometric secure credentialing solution we are providing for Ecuador is the same technology being deployed for the Los Angeles World Airports, which we announced earlier this year," noted Jim Miller, Chairman and CEO. "In fact, we can easily replicate this platform for virtually any port system that needs transportation worker identification cards in order to comply with the SAFE Port Act. Not only are our solutions easily deployable, for ImageWare they generally represent gross margins above 70% as well as a recurring revenue stream. Our unique patented technology has the potential to provide us strong, steady revenue growth, along with excellent forward-looking visibility."
For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO: www.securitystockwatch.com/Interviews/in_Boardroom_IMW.html
For ImageWare Systems Investors: http://www.iwsinc.com/investors.cfm
For more information: www.iwsinc.com, (OTCQB: IWSY)
Keyscan Access Control Systems
Keyscan Access Control Systems recently announced that its' next generation communication module, the CIM (Communications Interlink Module), is now available.
The Keyscan CIM is a new communication control module designed to use a CAN Bus communication network to provide optimized server to Access Control Unit (ACU) communication as well as give users an all new ACU to ACU network permitting inter-panel communication for global functions including anti-passback, global input/output and global time zones.
"The Keyscan CIM is just another example of Keyscan Access Control Systems' commitment to innovation and quality. It is the new communication standard for Keyscan and opens up a host of new features as well as enhancements especially for global communication," says Steve Dentinger, Keyscan Director of Sales and Marketing.
The Keyscan CIM utilizes a Controller Area Network (CAN) Bus infrastructure to establish a communication network among multiple ACUs as well ACUs and a host server. The capabilities of CAN already surpass those of other serial communication technologies. But, Keyscan didn't stop there.
Keyscan CIM combines the robust CAN Bus protocol with a hardware interface that is superior to the standard commercial-grade CAN Bus. It is a fully isolated CAN Bus using high speed digital isolation devices that separates ground reference of the CIM and ACU from the ground reference of the CAN Bus transceiver. This reduces problems found when there is a difference in ground potential between units. This is often observed in multi-building installations or in poor grounding conditions.
This isolation further protects the CIM, and connected ACU, from lightning strikes or electrical surges reducing the occurrence of module failure. It also ensures a single unpowered CIM cannot adversely affect the data of the CAN Bus.
A common-mode filtering at the CAN Bus transceiver reduces ground referenced noise from the CAN Bus which improves signal quality reducing bit errors and bus faults. DC biased termination resistors provide the necessary termination of the CAN Bus cabling but also ensure the full potential of the CAN Bus signal is utilized. In addition to providing server to ACU and global inter-panel communication, the Keyscan CIM also includes impressive new features including ground loop protection, enhanced device-based diagnostic capabilities, improved speed and unprecedented reliability.
"The Keyscan CIM offers new features, enhancements and possibilities, especially when it comes to global communications," Dentinger continued.
"It changes the dynamics of Keyscan ACU to ACU and ACU to server communication and forms a new foundation for global communication. And, once again, demonstrates how Keyscan offers access control systems without limits; and innovation without boundaries."
We invite you to learn more about the new Communication Interlink Module and our family of access control units. Click here to visit our website www.keyscan.ca
For the complete interview with Mr. Steve Dentinger, Keyscan Director of Sales and Marketing: http://www.securitystockwatch.com/Interviews/in_Boardroom_Keyscan.html
For the Keyscan Corporate Video: http://www.keyscan.ca/video.html
For Keyscan Case Studies: http://www.keyscan.ca/casestudies.html
For more information: www.Keyscan.ca
KEEP YOUR IP
Keep Your IP recently announced their cooperation with global standards provider, UL (Underwriters Laboratories) in an attempt to expand the scope of several of their standards and categories wherein the Keep Your IP line of IP forwarding services can become certified.
At present, UL's Certification of Alarm Services is specific to protected properties and has some limits. These limits include the aspects of the telecommunications infrastructure within the service. UL Alarm Service Certificates currently specify that their Certificates do not apply to the communications channel between the protected property and any facility that monitors signals from the protected property.
Keep Your IP's service, and its supporting hardware, lie in the communications channel between protected property and the monitoring facility which presently puts it outside the scope of UL's Certification.
Davin Roos, President of KYI, Inc., says, "We are very excited to assist UL in establishing a category that will address new technological advancements on communications within the alarm industry."
"Today's technology makes it possible for innovators to deliver an amazing array of new and beneficial services. Helping organizations bring those services into the market in a way that preserves the integrity of the public's security is a big part of UL's mission." stated Steve Schmit, Engineering Manager at UL LLC out of Northbrook, IL. "We look forward to working with Keep Your IP and the entire industry on Certification solutions that bring trust and confidence to all stakeholders."
UL has confirmed that an alarm company's use of the Keep Your IP service would not impact their Listing or Certification status in any way.
To that end, UL has communicated their desire to better accommodate the rapidly changing communications infrastructure and hope to have an offering that fits the Keep Your IP product in the not too distant future, possibly as early as the first quarter of 2013.
Keep Your IP also recently announced a major reseller agreement with COPS Monitoring, one of the country's largest wholesale monitoring companies.
KYI, Inc. and COPS Monitoring have signed an agreement wherein COPS will offer the complete lineup of Keep Your IP services to their approximately 3,500 dealers.
Keep Your IP is considered the industry's first and only internet IPv4 forwarding service designed exclusively for the alarm industry. Keep Your IP services will be both a tool to increase value for the alarm dealer by giving them better control over of their accounts as well as critical IP disaster recovery support service for the Central Station.
Davin Roos, president of KYI, Inc., says, "By providing alarm professionals with their own secure IPv4 numbered address, they get the peace of mind of knowing that as their business grows and merges into the new internet IP based world, they will be able to direct that growth as they desire."
"COPS Monitoring continually searches for ways to offer leading-edge services to help our dealers prosper," added Jim McMullen, President and COO of COPS Monitoring. "We are proud to offer Keep Your IP's services and we're confident that our dealers will see the advantages of having the flexibility and assurances they can offer."
For the complete interview with Davin Roos, President of KYI: http://www.securitystockwatch.com/Interviews/in_Boardroom_KYIP.html
For more information about Keep Your IP and "How It Works": https://www.keepyourip.com/how_it_works
Mr. Thomas Carnevale, President and CEO, Sentry360, told us, "2012 brought several exciting flagship projects and record deployments for Oil and Gas, transportation & retail markets. All of Sentry360's cameras are securing JFK Airport Terminal 1. After an extensive product evaluation cycle by the end-user sentry360 were selected over the competition.
"In the retail space Sentry360 was selected as the megapixel camera of choice for Microsoft's Retail division. Sentry360 products were also chosen to secure several hundred natural gas fueling centers reducing their camera counts and improving while delivering forensic detail of license plates upon entrance and exits with our InSight 5 megapixel cameras and 360-degree coverage with our FullSight Omni-directional cameras."
For the complete interview with Mr. Thomas Carnevale, President and CEO, Sentry360: http://www.securitystockwatch.com/Interviews/in_Boardroom_Sentry360.html
For more information about Sentry360, please see these additional resources:
Sentry360 Blog: http://sentry360.wordpress.com
Sentry360 Partner Portal: Calculate Field-of-View, Image Quality & Storage/Bandwith along with tutorial and training videos we believe our portal is one of the most uniqe feature rich design tools for IP Video on the market and it's Free.
Sentry360 2012 Product Catalog: http://www.sentry360.com/files/Sentry360_Catalog_2012.pdf
Demonstration Videos: http://www.youtube.com/sentry360security
eSignSystems, a division of Wave Systems Corp., recently announced that CoreLogic® has launched AuthoSign, a comprehensive electronic document management and signing capability built upon eSignSystems technology. AuthoSign is a custom deployment of eSignSystems' SmartSAFE electronic signing and management software that has been integrated directly into IntelliMods, a complete loan modification decisioning solution from CoreLogic. CoreLogic is a leader in providing comprehensive data, analytics and services to financial services and real estate professionals.
CoreLogic provides tremendous time and cost savings through its automated and customizable loan modification decisioning and delivery solution. IntelliMods from CoreLogic can upload a single loan or an entire loan portfolio within minutes to qualify loan modifications, output documents, and send them to the borrower. This presents significant cost savings for the mortgage banking industry, which has completed more than 5.82 million permanent loan modifications since 2007 as reported by HOPE NOW.
The AuthoSign integration with IntelliMods shortens the loan modification process by several days, and even weeks, for significant time and cost savings over traditional paper-based loan modification decisioning systems. Additionally, AuthoSign tracks and creates action alerts for each individual participating in the mortgage process and hosts the entire signing ceremony online. Every transaction is logged for retrieval by IntelliMods, ensuring comprehensive tracking of every user and signer's activity within AuthoSign. Additionally, management of the entire process is even easier with the detailed tracking, compliance and alerts. This simplifies and speeds up the loan modification process, and keeps all stakeholders informed on the status of the loan modification decisioning and signings.
"CoreLogic is committed to increasing quality and reducing cost and turnaround time for our clients," said Sapan Bafna, Senior Director at CoreLogic. "By including the eSignSystems' technology as part of CoreLogic IntelliMods, we can offer our customers an easy to use and secure electronic SigningRoom. Plus, AuthoSign tracks electronic documents throughout their lifecycle, and creates an enforceable, legally-binding electronic record."
Maintaining an electronically signed record is essential to the integrity of a legally binding transaction. With AuthoSign, all records are verified and authenticated from eDelivery through eSignature and eRetention. This ensures that the access or signing credential (i.e., digital certificate, username or password) is verified and that the records remain free from tampering. Additionally, AuthoSign continuously updates the status of the loan modification's execution for real-time reporting.
AuthoSign also supports signer access to electronically signed documents as required by the ESIGN act. To meet the ESIGN act's legal and compliance requirements, users may access and print certified copies, while the actual archived, eSigned document is left untouched. Authorized individuals can manage, search, transfer and share electronic files, signed or unsigned, via the Web. All records are available to all interested parties in a secure and compliant environment.
"With the Treasury Department requiring a Single Point of Contact for all loan modifications, AuthoSign provides IntelliMods with a secure and compliant tool to manage, track and execute every aspect of the loan modification process, with audit trails from the beginning to the end of the transaction," said Kelly Purcell, EVP of eSignSystems. "CoreLogic even broke new ground as the first integrator to utilize a powerful new PDF text tagging feature of the SigningRoom, which expands their customers' ability to effectively identify and sign within PDF documents."
By integrating eSignSystems SmartSAFE technology into the IntelliMods loan modification decisioning solution, CoreLogic is providing better security and privacy for all parties involved in the transaction. In addition, traditional document transportation and storage costs are reduced dramatically, and the cycle time of loan modification is reduced by days or even weeks.
Wave Systems also recently announced that Scrambls for Enterprise (www.scrambls.com) was launched, giving organizations a means for their employees to safely collaborate over social media sites like Twitter® (www.Twitter.com) and Facebook (www.Facebook.com), and share files with cloud services like Dropbox (www.Dropbox.com) and Salesforce.com® (www.Salesforce.com). Scrambls protects data that is often overlooked in corporate security initiatives -- information shared online via social media, files stored in the cloud and data in motion.
Employees are free to leverage existing social media infrastructures to enter status updates, Tweets, blog posts, files and more, without jeopardizing security or privacy. Scrambls for Enterprise encrypts data before it ever leaves a user's computer or smartphone. Posts and files can only be viewed by those the enterprise grants permission to -- everyone else sees scrambled text.
"Social media and cloud services are expanding the way business is done, but enterprises need greater control of the information they share across the public web," commented Steven Sprague, scrambls co-creator and CEO of Wave Systems. "These services are often self-discovered by employees who use them to share critical information. Enterprises need to take responsibility for this new flow of data, and scrambls provides the privacy, security and audit controls similar to what you'd see with corporate email accounts."
The power of scrambls lies in the permissions granted to group members. To read a post or descramble a file, the service automatically applies the permission to make it readable again for only those individuals granted access. Business administrators set the policy and manage the groups. Add or remove people from the groups at any time to change who can read messages and files, even after they've been published on the web.
"Scrambls can open up new business opportunities with use cases for every type of vertical market," continued Sprague. "In healthcare, a private and protected channel for communication leads to better care and service. It's easy for doctors, social workers and caregivers to have sensitive discussions about the care of a family member in real time using popular tools like Twitter or Facebook. Those conversations remain private with scrambls."
For complete details about these announcements: http://www.wave.com/news/
For Wave Webcasts and Presentations: http://www.wave.com/news/webcasts.asp
For the Wave Blog: http://blog.wave.com/
For Wave Solutions: http://www.wave.com/solutions
For Wave Products: http://www.wave.com/products
For our exclusive interview with Mr. Steven Sprague, CEO and President of Wave Systems: http://www.securitystockwatch.com/Interviews/Conversation_WAVE_trusted.html
See Wave's "White Paper" Network Security: How to Defend an Infinitely Expanding Frontier: http://www.wave.com/collateral/03-000273_TPM-SED_whitepaper.pdf
For more information: www.wave.com (NASDAQ: WAVX)
PSA Security Network
Mr. Bill Bozeman, CPP, CHS, President/CEO, PSA Security Network, said, "PSA Security Network's Business Solutions (http://www.buypsa.com/Solutions) is a suite of value-added products, services and programs that help security professionals be more competitive in the marketplace. Each month, PSA President and CEO Bill Bozeman (http://www.buypsa.com/bbozeman) discusses a Business Solution in detail. This month we'll be focusing on Security Dealer Marketing (http://www.buypsa.com/Security-Dealer-Marketing).
SecurityStockWatch.com: What is Security Dealer Marketing's main focus?
Bill Bozeman: Security Dealer Marketing (SDM) focuses on creating brand awareness for and educating dealers and manufacturers on how marketing tools work, from collateral production to strategy deployment, to generate more recurring monthly revenue. They focus on generating results and creating services that work specifically for the security community.
SecurityStockWatch.com: What types of managed services are included with Security Dealer Marketing?
Bill Bozeman: They can help with any marketing questions or needs, from traditional design/print services to targeted online campaigns to comprehensive marketing strategy overhaul or development. Security Dealer Marketing works with many types of semi-custom website development packages, including Search Engine Optimization (SEO), Pay-Per-Click (PPC) and Google Analytics services. They also offer marketing support for point of sale materials, logo design or redesign, email marketing, social media campaigns and press releases.
SecurityStockWatch.com: How can Security Dealer Marketing help companies better their business?
Bill Bozeman: Security Dealer Marketing can handle the logistics and details of your marketing programs, allowing you to focus on other areas of your business. With years of expertise in security marketing, they eliminate the guess work. SDM has spent the last 15 years working with numerous large domestic brands, and they will that experience and use it to guide your company to get greater return on investment. They work with a number of PSA integrators and partners and we've been pleased with the partnership, service and results.
SecurityStockWatch.com: Where do I go to find more information or to start using Business Solutions?
Bill Bozeman: To learn more about Security Dealer Marketing (http://www.buypsa.com/Security-Dealer-Marketing) or any of the PSA Business Solutions programs, schedule a webinar demonstration, or get signed up, simply visit www.buyPSA.com/Solutions, call 303-450-3461, or email [email protected]. Additionally, all of PSA's trusted providers of Business Solutions will be at PSA-TEC 2013 (http://www.buypsa.com/Education/PSA-TEC), exhibiting on Wednesday, May 8, 2013. For the most up-to-date information on this event, visit http://www.psaTEC.com.
Security Industry Association
The Security Industry Association (SIA) Government Summit is an annual event that brings together government and industry leaders in the area of physical and electronic security. Attendees will enjoy an insightful, intimate environment where they can meet, speak with and network among our nation's leading policy makers, end-users and other relevant decision makers. Pulitzer-Prize winning journalist and best-selling author Bob Woodward will be the keynote speaker at this year's Government Summit, which will be held June 4-5, 2013. Those who register by Dec. 31, 2012 can save 50% off their registration fee; visit the SIA website to register today! (https://siamembers.siaonline.org/eweb/DynamicPage.aspx?WebCode=CSCEventInfoSC&evt_key=5addf3d8-5cc1-45c2-a330-cce8e650323b)
Imperial Capital Security Investor Conference
The Waldorf Astoria
301 Park Avenue New York, NY 10022
December 12-13, 2012
The Imperial Capital Security Investor Conference has grown to become the sector's premier annual event. Whether your firm specializes in cutting edge technology or traditional security systems, you will get a first-hand look at state-of-the-art solutions in the Enterprise, Residential and Homeland Security markets. Our 2012 Keynote Speaker Richard A. Clarke served in the Reagan, Clinton and both Bush administrations, was Special Advisor to the President on Cyber Security, a US counter-terrorism czar, and is the author of Cyber War.
You will hear from more than 60 leading Security companies -- the companies setting industry trends by leading innovation and delivering exceptional products & services and economic resilience. Gain a crucial edge in your market by learning how the Security industry is evolving into a critically integrated component of the business process.
- Access management teams driving the latest offerings tailored to the market's changing needs.
- Learn first-hand which companies will impact your business now and in the future.
- Hear how leading providers are responding to the current political and financial environment.
- Keep pace with strategic dynamics in the related M&A and Finance Markets.
Scheduled speakers include:
Jane Holl Lute, United States Deputy Secretary of Homeland Security
Richard Alan Clarke, Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States
Robert J. Carey, Principal deputy Chief Information Officer, United States Department of Defense
Mark Weatherford (Invited), Deputy Under Secretary for Cybersecurity, National Protection and Programs Directorate (NPPD)
Bradley N. Rotter, Executive Chairman, AirPatrol Corporation
Adrian Turner, Founder & CEO, Mocana
By using our website and any information located at www.SecurityStockWatch.com you agree to these "Terms".
SYS-CON Events announced today that VividCortex, the monitoring solution for the modern data system, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The database is the heart of most applications, but it’s also the part that’s hardest to scale, monitor, and optimize even as it’s growing 50% year over year. VividCortex is the first unified suite of database monitoring tools specifically desi...
Aug. 3, 2015 01:07 PM EDT
In their session at 17th Cloud Expo, Hal Schwartz, CEO of Secure Infrastructure & Services (SIAS), and Chuck Paolillo, CTO of Secure Infrastructure & Services (SIAS), provide a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. In his role as CEO of Secure Infrastructure & Services (SIAS), Hal Schwartz provides leadership and direction for the company.
Aug. 3, 2015 12:30 PM EDT Reads: 202
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
Aug. 3, 2015 12:15 PM EDT Reads: 268
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 17th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships at Com...
Aug. 3, 2015 11:48 AM EDT
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Aug. 3, 2015 10:45 AM EDT Reads: 232
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobi...
Aug. 3, 2015 09:45 AM EDT Reads: 362
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, analyzed a range of cloud offerings (IaaS, PaaS, SaaS) and discussed the benefits/challenges of migrating to each offe...
Aug. 3, 2015 07:30 AM EDT Reads: 187
"We've just seen a huge influx of new partners coming into our ecosystem, and partners building unique offerings on top of our API set," explained Seth Bostock, Chief Executive Officer at IndependenceIT, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Aug. 2, 2015 10:00 PM EDT Reads: 681
Take the Long View with Digital Transformation By @IoT2040 | @ThingsExpo #IoT #M2M #API #Microservices #InternetOfThings
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
Aug. 2, 2015 06:00 PM EDT Reads: 1,135
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Aug. 2, 2015 05:45 PM EDT Reads: 516
Chuck Piluso presented a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Prior to Secure Infrastructure and Services, Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of International Te...
Aug. 2, 2015 04:00 PM EDT Reads: 434
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
Aug. 2, 2015 03:00 PM EDT Reads: 555
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
Aug. 2, 2015 11:45 AM EDT Reads: 485
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
Aug. 2, 2015 09:00 AM EDT Reads: 1,699
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprecedented opportunities to improve business and government operations, decision making and mission support capabilities.
Aug. 1, 2015 10:00 AM EDT Reads: 342
[slides] A New Architecture for the Internet of Things By @JKirklan | @ThingsExpo @RedHatNews #IoT #M2M #InternetOfThings
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Jul. 30, 2015 07:30 PM EDT Reads: 1,422
Malicious agents are moving faster than the speed of business. Even more worrisome, most companies are relying on legacy approaches to security that are no longer capable of meeting current threats. In the modern cloud, threat diversity is rapidly expanding, necessitating more sophisticated security protocols than those used in the past or in desktop environments. Yet companies are falling for cloud security myths that were truths at one time but have evolved out of existence.
Jul. 30, 2015 06:00 PM EDT Reads: 1,825
[slides] Workloads and Public Cloud at @CloudExpo By @utollwi | @ProfitBricksUSA #DevOps #Containers #Microservices
Public Cloud IaaS started its life in the developer and startup communities and has grown rapidly to a $20B+ industry, but it still pales in comparison to how much is spent worldwide on IT: $3.6 trillion. In fact, there are 8.6 million data centers worldwide, the reality is many small and medium sized business have server closets and colocation footprints filled with servers and storage gear. While on-premise environment virtualization may have peaked at 75%, the Public Cloud has lagged in adop...
Jul. 30, 2015 04:00 PM EDT Reads: 2,239
The time is ripe for high speed resilient software defined storage solutions with unlimited scalability. ISS has been working with the leading open source projects and developed a commercial high performance solution that is able to grow forever without performance limitations. In his session at Cloud Expo, Alex Gorbachev, President of Intelligent Systems Services Inc., shared foundation principles of Ceph architecture, as well as the design to deliver this storage to traditional SAN storage co...
Jul. 30, 2015 03:00 PM EDT Reads: 1,767
MuleSoft has announced the findings of its 2015 Connectivity Benchmark Report on the adoption and business impact of APIs. The findings suggest traditional businesses are quickly evolving into "composable enterprises" built out of hundreds of connected software services, applications and devices. Most are embracing the Internet of Things (IoT) and microservices technologies like Docker. A majority are integrating wearables, like smart watches, and more than half plan to generate revenue with ...
Jul. 30, 2015 02:30 PM EDT Reads: 146