|By Marketwired .||
|December 11, 2012 12:01 AM EST||
RYE BROOK, NY -- (Marketwire) -- 12/11/12 -- ImageWare Systems (OTCQB: IWSY), Wave Systems (NASDAQ: WAVX)
Mrs. Ulrica de-Fort Menares, Director of Product Management for Cisco Medianet, told us, "An intelligent network must become more application-savvy. It must have the ability to determine the importance of a session based on its business value, and treat the session accordingly, end to end. One of the key medianet characteristics is its ability to become media-aware. Imagine this: The network can discover the type of endpoint and automatically configure the switch port for that type of device. This ability to plug and play any endpoint in the network is an example of tight integration between an intelligent network and an endpoint."
For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_Cisco_UFM.html
Videx, Inc., announced a new version of the CyberKey Vault 20, the CyberKey Vault 20 FX. The redesign features a sleek new look with weatherized input modules and an embedded Flex System Hub for improved performance, all offered at a new, lower price.
"The CyberKey Vault 20 FX is our most advanced key control cabinet (http://www.videx.com/cyberkey-vaults.html) yet," said James McGowan, VP of Sales and Marketing at Videx. "We built on the award winning original design and added extra durability and speed to meet the needs of today's demanding end-users. We believe it will surpass market expectations."
The Vault 20 FX is an intelligent key cabinet designed to manage, program, and dispense CyberKey smart keys. The keys are stored unprogrammed and locked securely in the cabinet until an RFID card and/or PIN code is presented to the cabinet. After reading the card and/or accepting the PIN, the CyberKey Vault programs a CyberKey with the individual's permissions. Keys are programmed with access privileges for each user, detailing which electronic locks (http://www.videx.com/cyberlock_cylinders.html) it can open and when. An audit record of all events is stored in both the locks and the keys. Each time a key is used at a lock, a record of the lock ID, date, and time is stored in the key, and a record of the key ID, date, and time is stored in the lock.
CyberKeys feature a unique electronic ID, preventing duplication. Although two keys can be programmed alike, each one leaves its own unique record within the system. When the key is returned to the Vault, the Vault downloads the key's audit trail, removes its permissions, and begins charging the key.
Videx offers three robust smart key vaults: CyberKey Vault 1, CyberKey Vault 20 FX, and CyberKey Vault WR. To learn more about the CyberLock line of access control (http://www.videx.com/cyberlock_overview.html) products, please visit our website at www.cyberlock.com.
For more information about CyberLock products: http://www.cyberlock.com/cyberlock_products.html.
For the complete interview with Mr. James McGowan, V.P. of Sales and Marketing, Videx:
For CyberLock News & Events:
For the CyberLock Solutions Center:
For more information:
Dove Net Technologies
Mr. Tony Nasca, Dove Net Technologies, said, "The Project System is the Complete Business Computer System for Contractors and Integrators. Companies that install: sound systems, nurse call systems, fire alarm systems, computer cabling, burglar systems, cctv, video systems, and systems contracting in general. Other companies that are using Project include Video Wholesale Distributors, Audio Visual Specialists, Video & Film Duplicators, Telephone System Specialists, and more". The major benefit that The Project System brings to the table is the that The Project System has been written in such a way that the software understands the business needs of these different industries and provide tools and feature sets to aid the contractor in running his business better. The most important aspect of The Project System is that The Project System provides a process flow to organize the company so that there is a standard process for quotes using Dove Net supplied Manufacturers Price Lists. You can also import your own price lists into The Project System."
For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_DNT.html
Dove Net Clients Rave About The Project System: http://www.dovenet.com/clients.htm
For a Dove Net Demo: http://www.dovenet.com/project2.htm
For more information about The Project System: http://www.dovenet.com/projectwin.htm
For more information: www.DoveNet.com
ImageWare Systems recently announced, "In addition to product development, ImageWare has been preparing for a major international deployment as the exclusive provider of biometric identity management for a prime contractor installing cargo scanning security at the Republic of Ecuador's major seaports. The initial deployment is currently scheduled to begin in the early part of 2013 at the Port of Guayaquil, the country's main seaport that handles a majority of its imports and exports. ImageWare expects to receive a fee for every port worker receiving credentials, as well as an annual management and maintenance fee, based on a percentage of the initial credentialing cost per worker. Depending upon the number of enrollees, the company expects the contract value to exceed $3.0 million over its seven year term.
"The high-end biometric secure credentialing solution we are providing for Ecuador is the same technology being deployed for the Los Angeles World Airports, which we announced earlier this year," noted Jim Miller, Chairman and CEO. "In fact, we can easily replicate this platform for virtually any port system that needs transportation worker identification cards in order to comply with the SAFE Port Act. Not only are our solutions easily deployable, for ImageWare they generally represent gross margins above 70% as well as a recurring revenue stream. Our unique patented technology has the potential to provide us strong, steady revenue growth, along with excellent forward-looking visibility."
For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO: www.securitystockwatch.com/Interviews/in_Boardroom_IMW.html
For ImageWare Systems Investors: http://www.iwsinc.com/investors.cfm
For more information: www.iwsinc.com, (OTCQB: IWSY)
Keyscan Access Control Systems
Keyscan Access Control Systems recently announced that its' next generation communication module, the CIM (Communications Interlink Module), is now available.
The Keyscan CIM is a new communication control module designed to use a CAN Bus communication network to provide optimized server to Access Control Unit (ACU) communication as well as give users an all new ACU to ACU network permitting inter-panel communication for global functions including anti-passback, global input/output and global time zones.
"The Keyscan CIM is just another example of Keyscan Access Control Systems' commitment to innovation and quality. It is the new communication standard for Keyscan and opens up a host of new features as well as enhancements especially for global communication," says Steve Dentinger, Keyscan Director of Sales and Marketing.
The Keyscan CIM utilizes a Controller Area Network (CAN) Bus infrastructure to establish a communication network among multiple ACUs as well ACUs and a host server. The capabilities of CAN already surpass those of other serial communication technologies. But, Keyscan didn't stop there.
Keyscan CIM combines the robust CAN Bus protocol with a hardware interface that is superior to the standard commercial-grade CAN Bus. It is a fully isolated CAN Bus using high speed digital isolation devices that separates ground reference of the CIM and ACU from the ground reference of the CAN Bus transceiver. This reduces problems found when there is a difference in ground potential between units. This is often observed in multi-building installations or in poor grounding conditions.
This isolation further protects the CIM, and connected ACU, from lightning strikes or electrical surges reducing the occurrence of module failure. It also ensures a single unpowered CIM cannot adversely affect the data of the CAN Bus.
A common-mode filtering at the CAN Bus transceiver reduces ground referenced noise from the CAN Bus which improves signal quality reducing bit errors and bus faults. DC biased termination resistors provide the necessary termination of the CAN Bus cabling but also ensure the full potential of the CAN Bus signal is utilized. In addition to providing server to ACU and global inter-panel communication, the Keyscan CIM also includes impressive new features including ground loop protection, enhanced device-based diagnostic capabilities, improved speed and unprecedented reliability.
"The Keyscan CIM offers new features, enhancements and possibilities, especially when it comes to global communications," Dentinger continued.
"It changes the dynamics of Keyscan ACU to ACU and ACU to server communication and forms a new foundation for global communication. And, once again, demonstrates how Keyscan offers access control systems without limits; and innovation without boundaries."
We invite you to learn more about the new Communication Interlink Module and our family of access control units. Click here to visit our website www.keyscan.ca
For the complete interview with Mr. Steve Dentinger, Keyscan Director of Sales and Marketing: http://www.securitystockwatch.com/Interviews/in_Boardroom_Keyscan.html
For the Keyscan Corporate Video: http://www.keyscan.ca/video.html
For Keyscan Case Studies: http://www.keyscan.ca/casestudies.html
For more information: www.Keyscan.ca
KEEP YOUR IP
Keep Your IP recently announced their cooperation with global standards provider, UL (Underwriters Laboratories) in an attempt to expand the scope of several of their standards and categories wherein the Keep Your IP line of IP forwarding services can become certified.
At present, UL's Certification of Alarm Services is specific to protected properties and has some limits. These limits include the aspects of the telecommunications infrastructure within the service. UL Alarm Service Certificates currently specify that their Certificates do not apply to the communications channel between the protected property and any facility that monitors signals from the protected property.
Keep Your IP's service, and its supporting hardware, lie in the communications channel between protected property and the monitoring facility which presently puts it outside the scope of UL's Certification.
Davin Roos, President of KYI, Inc., says, "We are very excited to assist UL in establishing a category that will address new technological advancements on communications within the alarm industry."
"Today's technology makes it possible for innovators to deliver an amazing array of new and beneficial services. Helping organizations bring those services into the market in a way that preserves the integrity of the public's security is a big part of UL's mission." stated Steve Schmit, Engineering Manager at UL LLC out of Northbrook, IL. "We look forward to working with Keep Your IP and the entire industry on Certification solutions that bring trust and confidence to all stakeholders."
UL has confirmed that an alarm company's use of the Keep Your IP service would not impact their Listing or Certification status in any way.
To that end, UL has communicated their desire to better accommodate the rapidly changing communications infrastructure and hope to have an offering that fits the Keep Your IP product in the not too distant future, possibly as early as the first quarter of 2013.
Keep Your IP also recently announced a major reseller agreement with COPS Monitoring, one of the country's largest wholesale monitoring companies.
KYI, Inc. and COPS Monitoring have signed an agreement wherein COPS will offer the complete lineup of Keep Your IP services to their approximately 3,500 dealers.
Keep Your IP is considered the industry's first and only internet IPv4 forwarding service designed exclusively for the alarm industry. Keep Your IP services will be both a tool to increase value for the alarm dealer by giving them better control over of their accounts as well as critical IP disaster recovery support service for the Central Station.
Davin Roos, president of KYI, Inc., says, "By providing alarm professionals with their own secure IPv4 numbered address, they get the peace of mind of knowing that as their business grows and merges into the new internet IP based world, they will be able to direct that growth as they desire."
"COPS Monitoring continually searches for ways to offer leading-edge services to help our dealers prosper," added Jim McMullen, President and COO of COPS Monitoring. "We are proud to offer Keep Your IP's services and we're confident that our dealers will see the advantages of having the flexibility and assurances they can offer."
For the complete interview with Davin Roos, President of KYI: http://www.securitystockwatch.com/Interviews/in_Boardroom_KYIP.html
For more information about Keep Your IP and "How It Works": https://www.keepyourip.com/how_it_works
Mr. Thomas Carnevale, President and CEO, Sentry360, told us, "2012 brought several exciting flagship projects and record deployments for Oil and Gas, transportation & retail markets. All of Sentry360's cameras are securing JFK Airport Terminal 1. After an extensive product evaluation cycle by the end-user sentry360 were selected over the competition.
"In the retail space Sentry360 was selected as the megapixel camera of choice for Microsoft's Retail division. Sentry360 products were also chosen to secure several hundred natural gas fueling centers reducing their camera counts and improving while delivering forensic detail of license plates upon entrance and exits with our InSight 5 megapixel cameras and 360-degree coverage with our FullSight Omni-directional cameras."
For the complete interview with Mr. Thomas Carnevale, President and CEO, Sentry360: http://www.securitystockwatch.com/Interviews/in_Boardroom_Sentry360.html
For more information about Sentry360, please see these additional resources:
Sentry360 Blog: http://sentry360.wordpress.com
Sentry360 Partner Portal: Calculate Field-of-View, Image Quality & Storage/Bandwith along with tutorial and training videos we believe our portal is one of the most uniqe feature rich design tools for IP Video on the market and it's Free.
Sentry360 2012 Product Catalog: http://www.sentry360.com/files/Sentry360_Catalog_2012.pdf
Demonstration Videos: http://www.youtube.com/sentry360security
eSignSystems, a division of Wave Systems Corp., recently announced that CoreLogic® has launched AuthoSign, a comprehensive electronic document management and signing capability built upon eSignSystems technology. AuthoSign is a custom deployment of eSignSystems' SmartSAFE electronic signing and management software that has been integrated directly into IntelliMods, a complete loan modification decisioning solution from CoreLogic. CoreLogic is a leader in providing comprehensive data, analytics and services to financial services and real estate professionals.
CoreLogic provides tremendous time and cost savings through its automated and customizable loan modification decisioning and delivery solution. IntelliMods from CoreLogic can upload a single loan or an entire loan portfolio within minutes to qualify loan modifications, output documents, and send them to the borrower. This presents significant cost savings for the mortgage banking industry, which has completed more than 5.82 million permanent loan modifications since 2007 as reported by HOPE NOW.
The AuthoSign integration with IntelliMods shortens the loan modification process by several days, and even weeks, for significant time and cost savings over traditional paper-based loan modification decisioning systems. Additionally, AuthoSign tracks and creates action alerts for each individual participating in the mortgage process and hosts the entire signing ceremony online. Every transaction is logged for retrieval by IntelliMods, ensuring comprehensive tracking of every user and signer's activity within AuthoSign. Additionally, management of the entire process is even easier with the detailed tracking, compliance and alerts. This simplifies and speeds up the loan modification process, and keeps all stakeholders informed on the status of the loan modification decisioning and signings.
"CoreLogic is committed to increasing quality and reducing cost and turnaround time for our clients," said Sapan Bafna, Senior Director at CoreLogic. "By including the eSignSystems' technology as part of CoreLogic IntelliMods, we can offer our customers an easy to use and secure electronic SigningRoom. Plus, AuthoSign tracks electronic documents throughout their lifecycle, and creates an enforceable, legally-binding electronic record."
Maintaining an electronically signed record is essential to the integrity of a legally binding transaction. With AuthoSign, all records are verified and authenticated from eDelivery through eSignature and eRetention. This ensures that the access or signing credential (i.e., digital certificate, username or password) is verified and that the records remain free from tampering. Additionally, AuthoSign continuously updates the status of the loan modification's execution for real-time reporting.
AuthoSign also supports signer access to electronically signed documents as required by the ESIGN act. To meet the ESIGN act's legal and compliance requirements, users may access and print certified copies, while the actual archived, eSigned document is left untouched. Authorized individuals can manage, search, transfer and share electronic files, signed or unsigned, via the Web. All records are available to all interested parties in a secure and compliant environment.
"With the Treasury Department requiring a Single Point of Contact for all loan modifications, AuthoSign provides IntelliMods with a secure and compliant tool to manage, track and execute every aspect of the loan modification process, with audit trails from the beginning to the end of the transaction," said Kelly Purcell, EVP of eSignSystems. "CoreLogic even broke new ground as the first integrator to utilize a powerful new PDF text tagging feature of the SigningRoom, which expands their customers' ability to effectively identify and sign within PDF documents."
By integrating eSignSystems SmartSAFE technology into the IntelliMods loan modification decisioning solution, CoreLogic is providing better security and privacy for all parties involved in the transaction. In addition, traditional document transportation and storage costs are reduced dramatically, and the cycle time of loan modification is reduced by days or even weeks.
Wave Systems also recently announced that Scrambls for Enterprise (www.scrambls.com) was launched, giving organizations a means for their employees to safely collaborate over social media sites like Twitter® (www.Twitter.com) and Facebook (www.Facebook.com), and share files with cloud services like Dropbox (www.Dropbox.com) and Salesforce.com® (www.Salesforce.com). Scrambls protects data that is often overlooked in corporate security initiatives -- information shared online via social media, files stored in the cloud and data in motion.
Employees are free to leverage existing social media infrastructures to enter status updates, Tweets, blog posts, files and more, without jeopardizing security or privacy. Scrambls for Enterprise encrypts data before it ever leaves a user's computer or smartphone. Posts and files can only be viewed by those the enterprise grants permission to -- everyone else sees scrambled text.
"Social media and cloud services are expanding the way business is done, but enterprises need greater control of the information they share across the public web," commented Steven Sprague, scrambls co-creator and CEO of Wave Systems. "These services are often self-discovered by employees who use them to share critical information. Enterprises need to take responsibility for this new flow of data, and scrambls provides the privacy, security and audit controls similar to what you'd see with corporate email accounts."
The power of scrambls lies in the permissions granted to group members. To read a post or descramble a file, the service automatically applies the permission to make it readable again for only those individuals granted access. Business administrators set the policy and manage the groups. Add or remove people from the groups at any time to change who can read messages and files, even after they've been published on the web.
"Scrambls can open up new business opportunities with use cases for every type of vertical market," continued Sprague. "In healthcare, a private and protected channel for communication leads to better care and service. It's easy for doctors, social workers and caregivers to have sensitive discussions about the care of a family member in real time using popular tools like Twitter or Facebook. Those conversations remain private with scrambls."
For complete details about these announcements: http://www.wave.com/news/
For Wave Webcasts and Presentations: http://www.wave.com/news/webcasts.asp
For the Wave Blog: http://blog.wave.com/
For Wave Solutions: http://www.wave.com/solutions
For Wave Products: http://www.wave.com/products
For our exclusive interview with Mr. Steven Sprague, CEO and President of Wave Systems: http://www.securitystockwatch.com/Interviews/Conversation_WAVE_trusted.html
See Wave's "White Paper" Network Security: How to Defend an Infinitely Expanding Frontier: http://www.wave.com/collateral/03-000273_TPM-SED_whitepaper.pdf
For more information: www.wave.com (NASDAQ: WAVX)
PSA Security Network
Mr. Bill Bozeman, CPP, CHS, President/CEO, PSA Security Network, said, "PSA Security Network's Business Solutions (http://www.buypsa.com/Solutions) is a suite of value-added products, services and programs that help security professionals be more competitive in the marketplace. Each month, PSA President and CEO Bill Bozeman (http://www.buypsa.com/bbozeman) discusses a Business Solution in detail. This month we'll be focusing on Security Dealer Marketing (http://www.buypsa.com/Security-Dealer-Marketing).
SecurityStockWatch.com: What is Security Dealer Marketing's main focus?
Bill Bozeman: Security Dealer Marketing (SDM) focuses on creating brand awareness for and educating dealers and manufacturers on how marketing tools work, from collateral production to strategy deployment, to generate more recurring monthly revenue. They focus on generating results and creating services that work specifically for the security community.
SecurityStockWatch.com: What types of managed services are included with Security Dealer Marketing?
Bill Bozeman: They can help with any marketing questions or needs, from traditional design/print services to targeted online campaigns to comprehensive marketing strategy overhaul or development. Security Dealer Marketing works with many types of semi-custom website development packages, including Search Engine Optimization (SEO), Pay-Per-Click (PPC) and Google Analytics services. They also offer marketing support for point of sale materials, logo design or redesign, email marketing, social media campaigns and press releases.
SecurityStockWatch.com: How can Security Dealer Marketing help companies better their business?
Bill Bozeman: Security Dealer Marketing can handle the logistics and details of your marketing programs, allowing you to focus on other areas of your business. With years of expertise in security marketing, they eliminate the guess work. SDM has spent the last 15 years working with numerous large domestic brands, and they will that experience and use it to guide your company to get greater return on investment. They work with a number of PSA integrators and partners and we've been pleased with the partnership, service and results.
SecurityStockWatch.com: Where do I go to find more information or to start using Business Solutions?
Bill Bozeman: To learn more about Security Dealer Marketing (http://www.buypsa.com/Security-Dealer-Marketing) or any of the PSA Business Solutions programs, schedule a webinar demonstration, or get signed up, simply visit www.buyPSA.com/Solutions, call 303-450-3461, or email [email protected]. Additionally, all of PSA's trusted providers of Business Solutions will be at PSA-TEC 2013 (http://www.buypsa.com/Education/PSA-TEC), exhibiting on Wednesday, May 8, 2013. For the most up-to-date information on this event, visit http://www.psaTEC.com.
Security Industry Association
The Security Industry Association (SIA) Government Summit is an annual event that brings together government and industry leaders in the area of physical and electronic security. Attendees will enjoy an insightful, intimate environment where they can meet, speak with and network among our nation's leading policy makers, end-users and other relevant decision makers. Pulitzer-Prize winning journalist and best-selling author Bob Woodward will be the keynote speaker at this year's Government Summit, which will be held June 4-5, 2013. Those who register by Dec. 31, 2012 can save 50% off their registration fee; visit the SIA website to register today! (https://siamembers.siaonline.org/eweb/DynamicPage.aspx?WebCode=CSCEventInfoSC&evt_key=5addf3d8-5cc1-45c2-a330-cce8e650323b)
Imperial Capital Security Investor Conference
The Waldorf Astoria
301 Park Avenue New York, NY 10022
December 12-13, 2012
The Imperial Capital Security Investor Conference has grown to become the sector's premier annual event. Whether your firm specializes in cutting edge technology or traditional security systems, you will get a first-hand look at state-of-the-art solutions in the Enterprise, Residential and Homeland Security markets. Our 2012 Keynote Speaker Richard A. Clarke served in the Reagan, Clinton and both Bush administrations, was Special Advisor to the President on Cyber Security, a US counter-terrorism czar, and is the author of Cyber War.
You will hear from more than 60 leading Security companies -- the companies setting industry trends by leading innovation and delivering exceptional products & services and economic resilience. Gain a crucial edge in your market by learning how the Security industry is evolving into a critically integrated component of the business process.
- Access management teams driving the latest offerings tailored to the market's changing needs.
- Learn first-hand which companies will impact your business now and in the future.
- Hear how leading providers are responding to the current political and financial environment.
- Keep pace with strategic dynamics in the related M&A and Finance Markets.
Scheduled speakers include:
Jane Holl Lute, United States Deputy Secretary of Homeland Security
Richard Alan Clarke, Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States
Robert J. Carey, Principal deputy Chief Information Officer, United States Department of Defense
Mark Weatherford (Invited), Deputy Under Secretary for Cybersecurity, National Protection and Programs Directorate (NPPD)
Bradley N. Rotter, Executive Chairman, AirPatrol Corporation
Adrian Turner, Founder & CEO, Mocana
By using our website and any information located at www.SecurityStockWatch.com you agree to these "Terms".
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
Jun. 27, 2016 07:00 AM EDT Reads: 656
SaaS companies can greatly expand revenue potential by pushing beyond their own borders. The challenge is how to do this without degrading service quality. In his session at 18th Cloud Expo, Adam Rogers, Managing Director at Anexia, discussed how IaaS providers with a global presence and both virtual and dedicated infrastructure can help companies expand their service footprint with low “go-to-market” costs.
Jun. 27, 2016 02:00 AM EDT Reads: 860
You are moving to the Cloud. The question is not if, it’s when. Now that your competitors are in the cloud and lapping you, your “when” better hurry up and get here. But saying and doing are two different things. In his session at @DevOpsSummit at 18th Cloud Expo, Robert Reeves, CTO of Datical, explained how DevOps can be your onramp to the cloud. By adopting simple, platform independent DevOps strategies, you can accelerate your move to the cloud. Spoiler Alert: He also makes sure you don’t...
Jun. 26, 2016 06:30 PM EDT Reads: 929
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Jun. 26, 2016 05:00 PM EDT Reads: 1,300
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Jun. 26, 2016 05:00 PM EDT Reads: 1,208
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
Jun. 26, 2016 04:45 PM EDT Reads: 875
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Jun. 26, 2016 04:30 PM EDT Reads: 948
"SpeedyCloud's specialty lies in providing cloud services - we provide IaaS for Internet and enterprises companies," explained Hao Yu, CEO and co-founder of SpeedyCloud, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jun. 26, 2016 04:00 PM EDT Reads: 835
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Jun. 26, 2016 04:00 PM EDT Reads: 1,255
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Jun. 26, 2016 04:00 PM EDT Reads: 1,313
Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th...
Jun. 26, 2016 03:00 PM EDT Reads: 974
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change t...
Jun. 26, 2016 02:00 PM EDT Reads: 1,130
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Jun. 26, 2016 01:00 PM EDT Reads: 799
The initial debate is over: Any enterprise with a serious commitment to IT is migrating to the cloud. But things are not so simple. There is a complex mix of on-premises, colocated, and public-cloud deployments. In this power panel at 18th Cloud Expo, moderated by Conference Chair Roger Strukhoff, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships at Commvault; Dave Landa, Chief Operating Officer at kintone; William Morrish, General Manager Product Sales at Interou...
Jun. 26, 2016 12:45 PM EDT Reads: 806
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jun. 26, 2016 12:30 PM EDT Reads: 1,045
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
Jun. 26, 2016 12:00 PM EDT Reads: 956
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
Jun. 26, 2016 12:00 PM EDT Reads: 1,288
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
Jun. 26, 2016 12:00 PM EDT Reads: 1,347
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Jun. 26, 2016 12:00 PM EDT Reads: 1,086
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, discussed how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He also discussed how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors ...
Jun. 26, 2016 11:00 AM EDT Reads: 855