|By Business Wire||
|February 20, 2014 02:02 PM EST||
RSA Conference USA 2014, the world’s largest information security event, takes place February 24 - 28, 2014 at the Moscone Center in San Francisco. Listed below are RSA Conference USA 2014 exhibitor profiles M through Z.
Links to important information:
RSA Conference USA Sponsor and Exhibitor News: http://www.tradeshownews.com/events/RSA-Conference-USA-2014/
Media Information: http://www.rsaconference.com/events/us14/press
Follow the RSA Conference USA on twitter (official hashtag is #RSAC): https://twitter.com/RSAConference
|The leader in Mobile IT, MobileIron was purpose-built to secure and manage mobile apps, content, and devices for global companies. Available as an on-premise or cloud solution, MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy controls. For more information, please visit www.mobileiron.com.|
|Narus, a wholly owned subsidiary of The Boeing Company (NYSE:BA), is a pioneer in cybersecurity data analytics. The company's patented advanced analytics help enterprises, carriers and government customers proactively identify and accelerate the resolution of cyber threats. Using incisive intelligence culled from visual interactive and underlying data analytics, Narus nSystem identifies, predicts and characterizes the most advanced security threats, giving executives the visibility and context they need to make the right security decisions, right now, by letting them know what’s happening, why, and what to do about it. Narus boosts the ROI from existing IT investments.|
|NPCore, founded in 2008 in South Korea, is a premier network security solution provider, offering information security products such as ZombieZERO, for various customers in financial institutions, municipal offices, colleges, and small & mid-size companies. ZombieZERO is the only defense solution for the new APT (Advanced Persistent Threat) attack by offering behavior based security functions.|
|Ntrepid's Cyber Operations product suite has been enabling enterprises to securely conduct their online activities for nearly 20 years. From IP management tools to secure virtual browsing environments, our technologies and diverse global points of presence facilitate online research, investigations and data collection, while protecting identities and minimizing the spread of malware.|
|Introducing Passages by Ntrepid, a secure browser designed to mitigate malware and attribution concerns faced when conducting research and online activities. Passages isolates web browsing within a virtual machine and uses patented identity control technology to mask users true location and other identifying information. Learn more at GetPassages.com.|
|Ticker Symbol & Exchange:||Nasdaq: NXPI|
|NXP Semiconductors N.V. (Nasdaq: NXPI) provides High Performance Mixed Signal (HPMS) and Standard Product solutions that leverage its leading RF, Analog, Power Management, Interface, Security and Digital Processing expertise. It is a global semiconductor company with operations in more than 25 countries.|
|NXP is #1 in the overall, worldwide Identification market. NXP ID leads the way with complete solution expertise, world-class security and superior contactless performance. It delivers trusted mobile smart life solutions that authenticate identities, secure transactions and provide convenient interactions. These multi-application solutions are delivered without compromising security features, quality, convenience or design productivity.|
|Company:||OASIS Interoperability Showcase|
|Eleven companies demonstrate products that support the OASIS KMIP and PKCS #11 standards for encrypting data at rest, in-transit, and in the cloud. Cryptosense, Cryptsoft, Dell, Feitian, HP, IBM, P6R, Oracle, SafeNet, Thales e-Security, and Vormetric show standards-compliant enterprise key managers, storage appliances, HSMs, security tokens, and cryptographic toolkits all interoperating. See how the KMIP and PKCS #11 standards give CIOs, CSOs, and CTOs the freedom to select best-of-breed solutions.|
|OT is a world leader in digital security solutions for the mobility space. OT has always been at the heart of mobility, from the first smart cards to the latest contactless payment technologies which equip millions of smartphones. Present in the Payment, Telecommunications and Identity markets, OT offers end-to-end solutions in the Smart Transactions, Mobile Financial Services, Machine-to-Machine, Digital Identity and Transport & Access Control fields. OT employs over 6 000 employees worldwide, including 600 R&D people. With more than 50 sales offices across 5 continents and 10 facilities, OT’s international network serves clients in 140 countries.|
|For more information: www.oberthur.com.|
|Okta is an enterprise-grade identity management service, built from the ground up in the cloud and designed to address the challenges of a cloud, mobile and interconnected business world. Okta integrates with existing directories and identity systems, as well as thousands of on-premises, cloud-based and mobile applications, to enable IT to securely manage access anywhere, anytime and from any device. More than 550 enterprises worldwide use Okta to increase security and employee productivity, as well as lower IT costs and improve compliance.|
|The company is based in San Francisco, CA and is backed by venture capital firms Andreessen Horowitz, Greylock Partners, Khosla Ventures and Sequoia Capital. For more information, please visit www.okta.com.|
|Booth:||South Expo 252|
|OpenDNS delivers enterprise threat protection to reduce the risk and impact of security breaches. Unlike on-premises appliances that lack coverage for eroding network perimeters, OpenDNS' cloud-delivered platform protects all devices, anywhere, any time without sacrificing performance or manageability. OpenDNS' security intelligence leverages a unique satellite view of the Internet and uses big data, analytics and visualization techniques to predict and block attacks before they happen. The OpenDNS Global Network is the world's largest Internet security network and secures over 50 million active users daily through 22 globally distributed data centers.|
|Prevalent Networks is an IT security innovator that develops proven technologies and services to help organizations reduce and monitor threats and risks posed by third-party vendors.|
|Company:||Procera Networks Inc.|
|Ticker Symbol & Exchange:||PKT|
|Procera Networks Inc. (NASDAQ: PKT) delivers Internet Intelligence solutions to service providers and network equipment manufacturers for analytics and enforcement of broadband traffic worldwide. Procera’s solutions provide actionable intelligence and policy enforcement to ensure a high quality experience for any Internet and network connected device. For more information, visit http://www.proceranetworks.com or follow Procera on Twitter at @ProceraNetworks. Procera Networks will showcase its next-generation Deep Packet Inspection engine, NAVL, alongside two of its technology partners, Napatech and Intel in Booth #2321. Procera's NAVL offers industry leading, high performance Deep Packet Inspection technology for integration into third party platforms.|
|RSA, The Security Division of EMC, is the premier provider of security, risk, and compliance-management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention, and Fraud Protection with industry-leading GRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform, and the data that is generated.|
|Seccuris has been helping clients with business-driven information security solutions through professional consulting and managed services since 1999. We're the alternative because we help you uncover known and unknown risks that threaten not only your technology, but also your entire enterprise. Then we work with you to design exactly what you need; whether it’s Enterprise Security Architecture, Information Assurance Audits, IT Risk Management and Compliance, Security Response Services or our OneStone™ Information Assurance Portal. That way you can make effective risk-based decisions at every level. Call us at (866) 644-8442 to discuss the right solution for your needs.|
|Security Mentor®, pioneer of security awareness training that employees love to take, enables companies in every industry to reduce risk by creating a more secure workforce. Interactive, highly engaging lessons teach critical security skills in an easy-to-understand, fun format. Our Brief, Frequent, Focused™ training model of 10-minute lessons delivered monthly fits employees’ busy schedules and keeps security top of mind. Training is served from Security Mentor’s Cloud LMS or provided as SCORM-compliant modules. Founded in 2008, customers range from Fortune 500 enterprises to local and state governments, including the State of Michigan. To learn more, request a demo at www.securitymentor.com.|
|Seculert provides enterprises comprehensive protection from advanced persistent threats and malware. Its integrated platform technology analyzes malware communications, traffic logs, and suspicious files to identify both known and unknown advanced threats. Seculert’s proven cloud-based technology leverages crowdsourcing and Big Data analytics to identify and block attacks as they develop. Founded in 2010, Seculert has offices in the U.S., the U.K. and Israel. For more information, visit www.seculert.com.|
|Company:||Secure Access Technologies Inc.,|
|Booth:||2434 South Hall|
|Secure Access Technologies Inc. (SAT) is a Menlo Park, CA based start-up that provides the strongest data security on the market today with stepped-up authentication and real-time proximity monitoring.|
|SAT uses the user's smart phone with SAT MobileID to protect data on mobile devices and computers.|
|The user authenticates only once to any application on any device when SAT MobileID is in proximity. When the user walks away, the data locks automatically.|
SAT partnered with RSA and MobileIron and has more than 10 patents issued. Breakthrough security and user experience. For more information, visit www.secureaccesstechnologies.com.
|Shape Security is a startup in Mountain View, California that has created a completely new approach to website defense. Its flagship product, the ShapeShifter, is the world’s first botwall: an advanced technology that disables the attack capability of malware, botnets, and scripts. This results in a comprehensive defense against the most serious website breaches, for which there are no other existing solutions. Shape is backed by top investors including Kleiner Perkins, Google Ventures, and Eric Schmidt. It is led by cybersecurity leaders from the Pentagon, Cisco, Mozilla, Oakley Networks, Palo Alto Networks, VMware, and Google.|
|Company:||Sims Recycling Solutions|
|Ticker Symbol & Exchange:||ASX: SGM|
|Sims Recycling Solutions (us.simsrecycling.com), the global leader in electronics reuse and recycling, offers customers comprehensive recycling services out of our 52 owned and operated sites across the globe.|
|Our customers rely on our global reach, expertise, and infrastructure to secure their data, process their electronic equipment in an environmentally responsible manner, protect their reputations, and eliminate their compliance risks.|
|In North America, Sims operates 14 sites enabling us to offer services anywhere you do business.|
|Booth:||South Expo 715|
|Skybox Security, Inc. provides the most powerful risk analytics for cyber security, giving security management and operations the tools they need to eliminate attack vectors and safeguard business data and services. Skybox solutions provide a context-aware view of the network and risks that drives effective vulnerability and threat management, firewall management, and continuous compliance monitoring. Organizations in Financial Services, Government, Energy, Defense, Retail, and Telecommunications rely on Skybox Security every day for automated, integrated security management solutions that lower risk exposure and optimize security management processes.|
|Company:||Software Diversified Services|
|Software Diversified Services (SDS) now provides all sales, support, and development for E-Business Server encryption and security software. SDS's E-Business Server is based on the McAfee product formerly marketed under the E-Business Server name, which McAfee has licensed to SDS.|
|SDS's commitment means this enterprise-scale encryption server will remain a trusted tool for years to come.|
|SDS teams the E-Business Server with its other security tools: VitalSigns for FTP automates secure file transfer; in collaboration with software from SSH Corporation, it encrypts data in transit.|
|Since 1982, SDS has provided software to hundreds of customers worldwide, including Global 500 companies.|
|Solarflare is the leading provider of application-intelligent networking I/O software and hardware that accelerate, monitor and secure network data. In January, Solarflare launched SolarSecure to provide a new level of server protection to mission-critical networks vulnerable to cyber security breaches. Without any need for additional hardware, Solarflare enables enterprises to implement security policies to guard servers at the network level. Solarflare protects hosts by implementing policies from the Norse Live Threat Intelligence dark list in the Solarflare DDOS filter engine. Visit Solarflare Booth #2220 to see the Solarflare+Norse demonstration of "Self-Protecting, Hardened Hosts."|
|Ticker Symbol & Exchange:||NYSE: SWI|
|SolarWinds provides powerful and affordable IT management software to customers worldwide from Fortune 500 enterprises to small businesses. In all of our market areas, our approach is consistent. We focus exclusively on IT pros and strive to eliminate the complexity that they have been forced to accept from traditional enterprise software vendors. SolarWinds delivers on this commitment with unexpected simplicity through products that are easy to find, buy, use and maintain while providing the power to address any IT management problem on any scale.|
|Company:||Solutionary / NTT Group Security Company|
|Ticker Symbol & Exchange:||NTT|
|Solutionary, a leading managed security services provider (MSSP), focuses on delivering managed security services, security consulting services and global threat intelligence. Solutionary services protect traditional and virtual IT infrastructures, cloud environments and mobile data. Clients are able to optimize security programs, make informed decisions, achieve compliance, and reduce costs. The Solutionary Security Engineering Research Team (SERT) researches the global threat landscape, providing actionable threat intelligence, enhanced threat detection and mitigating controls. Experienced, certified Solutionary security experts act as an extensions of clients' internal teams, providing industry-leading client service to global enterprise and mid-market clients across all industries.|
|Thales e-Security is a leading global provider of data encryption and cyber security solutions to the financial services, high technology, manufacturing, government and technology sectors. Thales is showcasing its high assurance cryptographic solutions for protecting big data, public key infrastructures (PKIs), cloud and mobile payments at this year's RSA Conference. As organizations increasingly rely on cryptography as part of their data protection strategy and to protect their critical systems, the trustworthiness of these crypto systems becomes paramount, particularly in light of recent concerns over back doors, poorly implemented crypto systems and the increasing burdens arising from privacy mandates. Thales can help organizations re-assess and re-evaluate their crypto security and key management infrastructure and deliver solutions that ensure their integrity and trustworthiness.|
|Company:||ThreatTrack Security, Inc.|
|ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware that are designed to evade the traditional cyber-defenses deployed by enterprises, and small and medium-sized businesses (SMBs) around the world. The company develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats, including its ThreatSecure advanced malware protection platform, ThreatAnalyzer malware behavioral analysis sandbox, VIPRE business and consumer antivirus software, and ThreatIQ real-time threat intelligence service.|
|Thycotic Software deploys smart, reliable, IT security solutions that empower companies to control and monitor privileged account credentials and identity access for administrators and end-users. A member of the Inc. 5000, Thycotic is recognized as the fastest growing, privately held PAM provider in the USA. Secret Server manages passwords and identity access across a company's entire IT infrastructure. Thycotic also provides end-user password rest and self-service AD group management tools. Trusted by over 2,500 organizations worldwide - including members of the Fortune 500, enterprises, government agencies, technology firms, universities, non-profits, and managed service providers. To learn more, please visit www.thycotic.com.|
|Company:||TIBCO Software, INC|
|Ticker Symbol & Exchange:||TIBX|
|TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use on-premise or as part of cloud computing environments. The TIBCO LogLogic® product line provides organizations with security, compliance and IT optimization through enterprise-class log management and predictive intelligence for big data which enables companies to achieve the Two-Second Advantage® – the ability to capture the right information at the right time and act on it preemptively for a competitive advantage. Learn more at www.tibco.com/loglogic.|
|TITUS solutions enable organizations to classify, protect and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. TITUS Classification Suite includes the leading email, document and file classification and marking solutions that enhance data loss prevention by involving end users in identifying sensitive information. TITUS solutions are trusted by over 2 million users within more than 600 organizations in 60 countries around the world. Our customers include Dell, Nokia, Dow Corning, United States Air Force, NATO, Pratt and Whitney, Canadian Department of National Defence, Australian Department of Defence, and the U.S. Department of Veterans Affairs.|
|TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT GRC management solutions that give decision makers a holistic view of their security posture, enable effective data protection and automate compliance. TraceSecurity's flagship software solution, TraceCSO, is the first platform to effectively transform IT GRC management into a unified and easy-to-use business application and can be deployed in a matter of weeks. With more than 1,700 customers, TraceSecurity supports organizations in financial services, healthcare, high-tech, insurance, government, education and other regulated sectors. Founded in 2004, the company has executive offices in Silicon Valley and offices in Baton Rouge, Louisiana.|
|Ticker Symbol & Exchange:||TSE: 4704; TYO 4704|
|Trend Micro Incorporated a global leader in security software, rated number one in server security (IDC, 2013), strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend MicroT Smart Protection NetworkT infrastructure, and are supported by over 1,200 threat experts around the globe. For more information, visit TrendMicro.com.|
|Booth:||3527, North Hall|
|Trustwave helps businesses fight cybercrime, protect data and reduce security risks. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs while safely embracing business imperatives including big data, BYOD and social media. More than two million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective data protection, risk management and threat intelligence. Trustwave is a privately held company, headquartered in Chicago, with customers in 96 countries. For more information about Trustwave, visit www.trustwave.com|
|Tufin® is the leader in Security Policy Orchestration, automating and accelerating network infrastructure changes while maintaining security and compliance. By improving network change processes, organizations using the Tufin Orchestration SuiteT will have a positive impact on the business by reducing the time and cost spent implementing network changes by up to 80 percent. The Tufin Orchestration Suite helps organizations automate security and efficiency into day-to-day operations, enabling them to be more agile and leverage technology to gain a competitive advantage. Founded in 2005, Tufin serves more than 1,300 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals and partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Stonesoft, Blue Coat, McAfee and BMC Software.|
|Ticker Symbol & Exchange:||NYSE: UIS|
|Unisys is a worldwide information technology company. We provide a portfolio of IT services, software, and technology that solves critical problems for clients. We specialize in helping clients secure their operations, increase the efficiency and utilization of their data centers, enhance support to their end users and constituents, and modernize their enterprise applications. To provide these services and solutions, we bring together offerings and capabilities in outsourcing services, systems integration and consulting services, infrastructure services, maintenance services, and high-end server technology. With approximately 23,000 employees, Unisys serves commercial organizations and government agencies throughout the world. For more information, visit http://www.unisys.com/unisys/.|
|Company:||University of Denver|
|University College, the college of professional and continuing studies at the University of Denver, offers cutting-edge master's degrees and certificates online and on campus in Information Systems Security. Students receive applied instruction from expert practitioners as they learn to navigate real-world security challenges. You will analyze security needs, provide viable solutions, and develop the breadth of knowledge needed for success in the global arena of information assurance. The curriculum covers such topics as network security, physical security, cryptography, cyber law, computer forensics, and application security. The University of Denver is a designated Center for Academic Excellence in Information Assurance Education.|
|Viewfinity is leveraging its core endpoint protection technology to meet the increased need for smarter, more agile security solutions, that not only detect but respond to threats. Our endpoint agent diligently monitors for and detects suspicious behavior, and responds by harnessing attacks before they permeate an IT infrastructure. Our visibility, detection and remediation, along with purposeful forensics, provide a structure that helps progress the level of cybersecurity that targets and adapts enterprise IT security mechanisms. Our endpoint protection encompasses forensics, prevention, visibility, and remediation, offering advanced protection against advanced targeted attacks.|
|wolfSSL, founded in 2004, is an open source Internet security company whose primary products include the CyaSSL lightweight SSL library and the yaSSL Embedded Web Server. Primary users are programmers building security functionality into their applications and devices. wolfSSL employs the dual licensing model, like MySQL, offering products under the GPLv2 as well as a standard commercial license.|
|wolfSSL's products are designed to offer optimal performance, rapid integration, the ability to leverage hardware crypto, and support for the most current standards. All products are designed with clean APIs, and are backed by a dedicated and responsive support and development team.|
|With global operations, Wontok, Inc. (booth # 2502) delivers proven data security solutions that fill the gaps left by conventional security offerings. Wontok's added layer of security provides businesses, government organizations and consumers the confidence that their online commerce and communications are secure and their data is safe. During The RSA Conference February 24-28th, Wontok announces two new malware prevention products targeted for Retailers and Banks adding on its flagship product, Wontok™ SafeCentral, a proven endpoint cybersecurity solution that renders malware inoperable even on already infected PCs running Windows. Please contact us to arrange an interview with Wontok's CEO, Adam Tegg.|
|Zscaler is transforming enterprise networking and security with the world’s largest Direct-to-Cloud Network, which securely enables the productivity benefits of cloud, mobile and social technologies without the cost and complexity of traditional on-premise appliances and software.|
|The Zscaler Direct-to-Cloud Network processes daily more than 12 billion transactions from more than 12 million users in 180 countries across 100 global data centers with near-zero latency. Learn why more than 4,500 global enterprises choose Zscaler to enable end-user productivity, enforce security policy and streamline WAN performance.|
About Business Wire
Business Wire, a Berkshire Hathaway company, is the global leader in press release distribution and regulatory disclosure. Investor relations, public relations, public policy and marketing professionals rely on Business Wire to accurately distribute market-moving news and multimedia, host online newsrooms and IR websites, build content marketing platforms, generate social engagements and provide audience analysis that improves interaction with specified target markets. Founded in 1961, Business Wire is a trusted source for news organizations, journalists, investment professionals and regulatory authorities, delivering news directly into editorial systems and leading online news sources via its multi-patented simultaneous NX Network. Business Wire has 32 offices worldwide to securely meet the varying needs of communications professionals and news consumers.
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management...
Feb. 7, 2016 03:30 PM EST Reads: 370
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, will provide an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profes...
Feb. 7, 2016 02:45 PM EST Reads: 139
SYS-CON Events announced today that VAI, a leading ERP software provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. VAI (Vormittag Associates, Inc.) is a leading independent mid-market ERP software developer renowned for its flexible solutions and ability to automate critical business functions for the distribution, manufacturing, specialty retail and service sectors. An IBM Premier Business Part...
Feb. 7, 2016 02:00 PM EST Reads: 555
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
Feb. 7, 2016 01:45 PM EST Reads: 361
Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ...
Feb. 7, 2016 01:30 PM EST
With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts...
Feb. 7, 2016 12:00 PM EST Reads: 344
SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 ad...
Feb. 7, 2016 11:30 AM EST Reads: 344
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, will discuss the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filte...
Feb. 7, 2016 10:15 AM EST Reads: 107
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
Feb. 7, 2016 07:00 AM EST Reads: 119
SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions to small, medium and large businesses, is the industry's single source for the cloud. Fusion's advanced, proprietary cloud service platform enables the integration of leading edge solutions in the cloud, including clou...
Feb. 6, 2016 03:30 PM EST Reads: 719
Most people haven’t heard the word, “gamification,” even though they probably, and perhaps unwittingly, participate in it every day. Gamification is “the process of adding games or game-like elements to something (as a task) so as to encourage participation.” Further, gamification is about bringing game mechanics – rules, constructs, processes, and methods – into the real world in an effort to engage people. In his session at @ThingsExpo, Robert Endo, owner and engagement manager of Intrepid D...
Feb. 5, 2016 09:00 PM EST Reads: 785
Eighty percent of a data scientist’s time is spent gathering and cleaning up data, and 80% of all data is unstructured and almost never analyzed. Cognitive computing, in combination with Big Data, is changing the equation by creating data reservoirs and using natural language processing to enable analysis of unstructured data sources. This is impacting every aspect of the analytics profession from how data is mined (and by whom) to how it is delivered. This is not some futuristic vision: it's ha...
Feb. 2, 2016 02:00 PM EST Reads: 410
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Feb. 2, 2016 04:30 AM EST Reads: 851
Learn how IoT, cloud, social networks and last but not least, humans, can be integrated into a seamless integration of cooperative organisms both cybernetic and biological. This has been enabled by recent advances in IoT device capabilities, messaging frameworks, presence and collaboration services, where devices can share information and make independent and human assisted decisions based upon social status from other entities. In his session at @ThingsExpo, Michael Heydt, founder of Seamless...
Feb. 1, 2016 05:00 AM EST Reads: 940
The IoT's basic concept of collecting data from as many sources possible to drive better decision making, create process innovation and realize additional revenue has been in use at large enterprises with deep pockets for decades. So what has changed? In his session at @ThingsExpo, Prasanna Sivaramakrishnan, Solutions Architect at Red Hat, discussed the impact commodity hardware, ubiquitous connectivity, and innovations in open source software are having on the connected universe of people, thi...
Jan. 31, 2016 09:00 PM EST Reads: 726
WebRTC: together these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at WebRTC Summit, Cary Bran, VP of Innovation and New Ventures at Plantronics and PLT Labs, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it may enable, complement or entirely transform.
Jan. 31, 2016 07:15 PM EST Reads: 1,146
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, showed how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants received the download information, scripts, and complete end-t...
Jan. 31, 2016 10:00 AM EST Reads: 1,216
For manufacturers, the Internet of Things (IoT) represents a jumping-off point for innovation, jobs, and revenue creation. But to adequately seize the opportunity, manufacturers must design devices that are interconnected, can continually sense their environment and process huge amounts of data. As a first step, manufacturers must embrace a new product development ecosystem in order to support these products.
Jan. 31, 2016 10:00 AM EST Reads: 812
Manufacturing connected IoT versions of traditional products requires more than multiple deep technology skills. It also requires a shift in mindset, to realize that connected, sensor-enabled “things” act more like services than what we usually think of as products. In his session at @ThingsExpo, David Friedman, CEO and co-founder of Ayla Networks, discussed how when sensors start generating detailed real-world data about products and how they’re being used, smart manufacturers can use the dat...
Jan. 30, 2016 07:45 PM EST Reads: 790
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT’s direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Buildi...
Jan. 30, 2016 03:45 PM EST Reads: 1,268