|By Business Wire||
|February 20, 2014 02:02 PM EST||
RSA Conference USA 2014, the world’s largest information security event, takes place February 24 - 28, 2014 at the Moscone Center in San Francisco. Listed below are RSA Conference USA 2014 exhibitor profiles M through Z.
Links to important information:
RSA Conference USA Sponsor and Exhibitor News: http://www.tradeshownews.com/events/RSA-Conference-USA-2014/
Media Information: http://www.rsaconference.com/events/us14/press
Follow the RSA Conference USA on twitter (official hashtag is #RSAC): https://twitter.com/RSAConference
|The leader in Mobile IT, MobileIron was purpose-built to secure and manage mobile apps, content, and devices for global companies. Available as an on-premise or cloud solution, MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy controls. For more information, please visit www.mobileiron.com.|
|Narus, a wholly owned subsidiary of The Boeing Company (NYSE:BA), is a pioneer in cybersecurity data analytics. The company's patented advanced analytics help enterprises, carriers and government customers proactively identify and accelerate the resolution of cyber threats. Using incisive intelligence culled from visual interactive and underlying data analytics, Narus nSystem identifies, predicts and characterizes the most advanced security threats, giving executives the visibility and context they need to make the right security decisions, right now, by letting them know what’s happening, why, and what to do about it. Narus boosts the ROI from existing IT investments.|
|NPCore, founded in 2008 in South Korea, is a premier network security solution provider, offering information security products such as ZombieZERO, for various customers in financial institutions, municipal offices, colleges, and small & mid-size companies. ZombieZERO is the only defense solution for the new APT (Advanced Persistent Threat) attack by offering behavior based security functions.|
|Ntrepid's Cyber Operations product suite has been enabling enterprises to securely conduct their online activities for nearly 20 years. From IP management tools to secure virtual browsing environments, our technologies and diverse global points of presence facilitate online research, investigations and data collection, while protecting identities and minimizing the spread of malware.|
|Introducing Passages by Ntrepid, a secure browser designed to mitigate malware and attribution concerns faced when conducting research and online activities. Passages isolates web browsing within a virtual machine and uses patented identity control technology to mask users true location and other identifying information. Learn more at GetPassages.com.|
|Ticker Symbol & Exchange:||Nasdaq: NXPI|
|NXP Semiconductors N.V. (Nasdaq: NXPI) provides High Performance Mixed Signal (HPMS) and Standard Product solutions that leverage its leading RF, Analog, Power Management, Interface, Security and Digital Processing expertise. It is a global semiconductor company with operations in more than 25 countries.|
|NXP is #1 in the overall, worldwide Identification market. NXP ID leads the way with complete solution expertise, world-class security and superior contactless performance. It delivers trusted mobile smart life solutions that authenticate identities, secure transactions and provide convenient interactions. These multi-application solutions are delivered without compromising security features, quality, convenience or design productivity.|
|Company:||OASIS Interoperability Showcase|
|Eleven companies demonstrate products that support the OASIS KMIP and PKCS #11 standards for encrypting data at rest, in-transit, and in the cloud. Cryptosense, Cryptsoft, Dell, Feitian, HP, IBM, P6R, Oracle, SafeNet, Thales e-Security, and Vormetric show standards-compliant enterprise key managers, storage appliances, HSMs, security tokens, and cryptographic toolkits all interoperating. See how the KMIP and PKCS #11 standards give CIOs, CSOs, and CTOs the freedom to select best-of-breed solutions.|
|OT is a world leader in digital security solutions for the mobility space. OT has always been at the heart of mobility, from the first smart cards to the latest contactless payment technologies which equip millions of smartphones. Present in the Payment, Telecommunications and Identity markets, OT offers end-to-end solutions in the Smart Transactions, Mobile Financial Services, Machine-to-Machine, Digital Identity and Transport & Access Control fields. OT employs over 6 000 employees worldwide, including 600 R&D people. With more than 50 sales offices across 5 continents and 10 facilities, OT’s international network serves clients in 140 countries.|
|For more information: www.oberthur.com.|
|Okta is an enterprise-grade identity management service, built from the ground up in the cloud and designed to address the challenges of a cloud, mobile and interconnected business world. Okta integrates with existing directories and identity systems, as well as thousands of on-premises, cloud-based and mobile applications, to enable IT to securely manage access anywhere, anytime and from any device. More than 550 enterprises worldwide use Okta to increase security and employee productivity, as well as lower IT costs and improve compliance.|
|The company is based in San Francisco, CA and is backed by venture capital firms Andreessen Horowitz, Greylock Partners, Khosla Ventures and Sequoia Capital. For more information, please visit www.okta.com.|
|Booth:||South Expo 252|
|OpenDNS delivers enterprise threat protection to reduce the risk and impact of security breaches. Unlike on-premises appliances that lack coverage for eroding network perimeters, OpenDNS' cloud-delivered platform protects all devices, anywhere, any time without sacrificing performance or manageability. OpenDNS' security intelligence leverages a unique satellite view of the Internet and uses big data, analytics and visualization techniques to predict and block attacks before they happen. The OpenDNS Global Network is the world's largest Internet security network and secures over 50 million active users daily through 22 globally distributed data centers.|
|Prevalent Networks is an IT security innovator that develops proven technologies and services to help organizations reduce and monitor threats and risks posed by third-party vendors.|
|Company:||Procera Networks Inc.|
|Ticker Symbol & Exchange:||PKT|
|Procera Networks Inc. (NASDAQ: PKT) delivers Internet Intelligence solutions to service providers and network equipment manufacturers for analytics and enforcement of broadband traffic worldwide. Procera’s solutions provide actionable intelligence and policy enforcement to ensure a high quality experience for any Internet and network connected device. For more information, visit http://www.proceranetworks.com or follow Procera on Twitter at @ProceraNetworks. Procera Networks will showcase its next-generation Deep Packet Inspection engine, NAVL, alongside two of its technology partners, Napatech and Intel in Booth #2321. Procera's NAVL offers industry leading, high performance Deep Packet Inspection technology for integration into third party platforms.|
|RSA, The Security Division of EMC, is the premier provider of security, risk, and compliance-management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention, and Fraud Protection with industry-leading GRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform, and the data that is generated.|
|Seccuris has been helping clients with business-driven information security solutions through professional consulting and managed services since 1999. We're the alternative because we help you uncover known and unknown risks that threaten not only your technology, but also your entire enterprise. Then we work with you to design exactly what you need; whether it’s Enterprise Security Architecture, Information Assurance Audits, IT Risk Management and Compliance, Security Response Services or our OneStone™ Information Assurance Portal. That way you can make effective risk-based decisions at every level. Call us at (866) 644-8442 to discuss the right solution for your needs.|
|Security Mentor®, pioneer of security awareness training that employees love to take, enables companies in every industry to reduce risk by creating a more secure workforce. Interactive, highly engaging lessons teach critical security skills in an easy-to-understand, fun format. Our Brief, Frequent, Focused™ training model of 10-minute lessons delivered monthly fits employees’ busy schedules and keeps security top of mind. Training is served from Security Mentor’s Cloud LMS or provided as SCORM-compliant modules. Founded in 2008, customers range from Fortune 500 enterprises to local and state governments, including the State of Michigan. To learn more, request a demo at www.securitymentor.com.|
|Seculert provides enterprises comprehensive protection from advanced persistent threats and malware. Its integrated platform technology analyzes malware communications, traffic logs, and suspicious files to identify both known and unknown advanced threats. Seculert’s proven cloud-based technology leverages crowdsourcing and Big Data analytics to identify and block attacks as they develop. Founded in 2010, Seculert has offices in the U.S., the U.K. and Israel. For more information, visit www.seculert.com.|
|Company:||Secure Access Technologies Inc.,|
|Booth:||2434 South Hall|
|Secure Access Technologies Inc. (SAT) is a Menlo Park, CA based start-up that provides the strongest data security on the market today with stepped-up authentication and real-time proximity monitoring.|
|SAT uses the user's smart phone with SAT MobileID to protect data on mobile devices and computers.|
|The user authenticates only once to any application on any device when SAT MobileID is in proximity. When the user walks away, the data locks automatically.|
SAT partnered with RSA and MobileIron and has more than 10 patents issued. Breakthrough security and user experience. For more information, visit www.secureaccesstechnologies.com.
|Shape Security is a startup in Mountain View, California that has created a completely new approach to website defense. Its flagship product, the ShapeShifter, is the world’s first botwall: an advanced technology that disables the attack capability of malware, botnets, and scripts. This results in a comprehensive defense against the most serious website breaches, for which there are no other existing solutions. Shape is backed by top investors including Kleiner Perkins, Google Ventures, and Eric Schmidt. It is led by cybersecurity leaders from the Pentagon, Cisco, Mozilla, Oakley Networks, Palo Alto Networks, VMware, and Google.|
|Company:||Sims Recycling Solutions|
|Ticker Symbol & Exchange:||ASX: SGM|
|Sims Recycling Solutions (us.simsrecycling.com), the global leader in electronics reuse and recycling, offers customers comprehensive recycling services out of our 52 owned and operated sites across the globe.|
|Our customers rely on our global reach, expertise, and infrastructure to secure their data, process their electronic equipment in an environmentally responsible manner, protect their reputations, and eliminate their compliance risks.|
|In North America, Sims operates 14 sites enabling us to offer services anywhere you do business.|
|Booth:||South Expo 715|
|Skybox Security, Inc. provides the most powerful risk analytics for cyber security, giving security management and operations the tools they need to eliminate attack vectors and safeguard business data and services. Skybox solutions provide a context-aware view of the network and risks that drives effective vulnerability and threat management, firewall management, and continuous compliance monitoring. Organizations in Financial Services, Government, Energy, Defense, Retail, and Telecommunications rely on Skybox Security every day for automated, integrated security management solutions that lower risk exposure and optimize security management processes.|
|Company:||Software Diversified Services|
|Software Diversified Services (SDS) now provides all sales, support, and development for E-Business Server encryption and security software. SDS's E-Business Server is based on the McAfee product formerly marketed under the E-Business Server name, which McAfee has licensed to SDS.|
|SDS's commitment means this enterprise-scale encryption server will remain a trusted tool for years to come.|
|SDS teams the E-Business Server with its other security tools: VitalSigns for FTP automates secure file transfer; in collaboration with software from SSH Corporation, it encrypts data in transit.|
|Since 1982, SDS has provided software to hundreds of customers worldwide, including Global 500 companies.|
|Solarflare is the leading provider of application-intelligent networking I/O software and hardware that accelerate, monitor and secure network data. In January, Solarflare launched SolarSecure to provide a new level of server protection to mission-critical networks vulnerable to cyber security breaches. Without any need for additional hardware, Solarflare enables enterprises to implement security policies to guard servers at the network level. Solarflare protects hosts by implementing policies from the Norse Live Threat Intelligence dark list in the Solarflare DDOS filter engine. Visit Solarflare Booth #2220 to see the Solarflare+Norse demonstration of "Self-Protecting, Hardened Hosts."|
|Ticker Symbol & Exchange:||NYSE: SWI|
|SolarWinds provides powerful and affordable IT management software to customers worldwide from Fortune 500 enterprises to small businesses. In all of our market areas, our approach is consistent. We focus exclusively on IT pros and strive to eliminate the complexity that they have been forced to accept from traditional enterprise software vendors. SolarWinds delivers on this commitment with unexpected simplicity through products that are easy to find, buy, use and maintain while providing the power to address any IT management problem on any scale.|
|Company:||Solutionary / NTT Group Security Company|
|Ticker Symbol & Exchange:||NTT|
|Solutionary, a leading managed security services provider (MSSP), focuses on delivering managed security services, security consulting services and global threat intelligence. Solutionary services protect traditional and virtual IT infrastructures, cloud environments and mobile data. Clients are able to optimize security programs, make informed decisions, achieve compliance, and reduce costs. The Solutionary Security Engineering Research Team (SERT) researches the global threat landscape, providing actionable threat intelligence, enhanced threat detection and mitigating controls. Experienced, certified Solutionary security experts act as an extensions of clients' internal teams, providing industry-leading client service to global enterprise and mid-market clients across all industries.|
|Thales e-Security is a leading global provider of data encryption and cyber security solutions to the financial services, high technology, manufacturing, government and technology sectors. Thales is showcasing its high assurance cryptographic solutions for protecting big data, public key infrastructures (PKIs), cloud and mobile payments at this year's RSA Conference. As organizations increasingly rely on cryptography as part of their data protection strategy and to protect their critical systems, the trustworthiness of these crypto systems becomes paramount, particularly in light of recent concerns over back doors, poorly implemented crypto systems and the increasing burdens arising from privacy mandates. Thales can help organizations re-assess and re-evaluate their crypto security and key management infrastructure and deliver solutions that ensure their integrity and trustworthiness.|
|Company:||ThreatTrack Security, Inc.|
|ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware that are designed to evade the traditional cyber-defenses deployed by enterprises, and small and medium-sized businesses (SMBs) around the world. The company develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats, including its ThreatSecure advanced malware protection platform, ThreatAnalyzer malware behavioral analysis sandbox, VIPRE business and consumer antivirus software, and ThreatIQ real-time threat intelligence service.|
|Thycotic Software deploys smart, reliable, IT security solutions that empower companies to control and monitor privileged account credentials and identity access for administrators and end-users. A member of the Inc. 5000, Thycotic is recognized as the fastest growing, privately held PAM provider in the USA. Secret Server manages passwords and identity access across a company's entire IT infrastructure. Thycotic also provides end-user password rest and self-service AD group management tools. Trusted by over 2,500 organizations worldwide - including members of the Fortune 500, enterprises, government agencies, technology firms, universities, non-profits, and managed service providers. To learn more, please visit www.thycotic.com.|
|Company:||TIBCO Software, INC|
|Ticker Symbol & Exchange:||TIBX|
|TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use on-premise or as part of cloud computing environments. The TIBCO LogLogic® product line provides organizations with security, compliance and IT optimization through enterprise-class log management and predictive intelligence for big data which enables companies to achieve the Two-Second Advantage® – the ability to capture the right information at the right time and act on it preemptively for a competitive advantage. Learn more at www.tibco.com/loglogic.|
|TITUS solutions enable organizations to classify, protect and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. TITUS Classification Suite includes the leading email, document and file classification and marking solutions that enhance data loss prevention by involving end users in identifying sensitive information. TITUS solutions are trusted by over 2 million users within more than 600 organizations in 60 countries around the world. Our customers include Dell, Nokia, Dow Corning, United States Air Force, NATO, Pratt and Whitney, Canadian Department of National Defence, Australian Department of Defence, and the U.S. Department of Veterans Affairs.|
|TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT GRC management solutions that give decision makers a holistic view of their security posture, enable effective data protection and automate compliance. TraceSecurity's flagship software solution, TraceCSO, is the first platform to effectively transform IT GRC management into a unified and easy-to-use business application and can be deployed in a matter of weeks. With more than 1,700 customers, TraceSecurity supports organizations in financial services, healthcare, high-tech, insurance, government, education and other regulated sectors. Founded in 2004, the company has executive offices in Silicon Valley and offices in Baton Rouge, Louisiana.|
|Ticker Symbol & Exchange:||TSE: 4704; TYO 4704|
|Trend Micro Incorporated a global leader in security software, rated number one in server security (IDC, 2013), strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend MicroT Smart Protection NetworkT infrastructure, and are supported by over 1,200 threat experts around the globe. For more information, visit TrendMicro.com.|
|Booth:||3527, North Hall|
|Trustwave helps businesses fight cybercrime, protect data and reduce security risks. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs while safely embracing business imperatives including big data, BYOD and social media. More than two million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective data protection, risk management and threat intelligence. Trustwave is a privately held company, headquartered in Chicago, with customers in 96 countries. For more information about Trustwave, visit www.trustwave.com|
|Tufin® is the leader in Security Policy Orchestration, automating and accelerating network infrastructure changes while maintaining security and compliance. By improving network change processes, organizations using the Tufin Orchestration SuiteT will have a positive impact on the business by reducing the time and cost spent implementing network changes by up to 80 percent. The Tufin Orchestration Suite helps organizations automate security and efficiency into day-to-day operations, enabling them to be more agile and leverage technology to gain a competitive advantage. Founded in 2005, Tufin serves more than 1,300 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals and partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Stonesoft, Blue Coat, McAfee and BMC Software.|
|Ticker Symbol & Exchange:||NYSE: UIS|
|Unisys is a worldwide information technology company. We provide a portfolio of IT services, software, and technology that solves critical problems for clients. We specialize in helping clients secure their operations, increase the efficiency and utilization of their data centers, enhance support to their end users and constituents, and modernize their enterprise applications. To provide these services and solutions, we bring together offerings and capabilities in outsourcing services, systems integration and consulting services, infrastructure services, maintenance services, and high-end server technology. With approximately 23,000 employees, Unisys serves commercial organizations and government agencies throughout the world. For more information, visit http://www.unisys.com/unisys/.|
|Company:||University of Denver|
|University College, the college of professional and continuing studies at the University of Denver, offers cutting-edge master's degrees and certificates online and on campus in Information Systems Security. Students receive applied instruction from expert practitioners as they learn to navigate real-world security challenges. You will analyze security needs, provide viable solutions, and develop the breadth of knowledge needed for success in the global arena of information assurance. The curriculum covers such topics as network security, physical security, cryptography, cyber law, computer forensics, and application security. The University of Denver is a designated Center for Academic Excellence in Information Assurance Education.|
|Viewfinity is leveraging its core endpoint protection technology to meet the increased need for smarter, more agile security solutions, that not only detect but respond to threats. Our endpoint agent diligently monitors for and detects suspicious behavior, and responds by harnessing attacks before they permeate an IT infrastructure. Our visibility, detection and remediation, along with purposeful forensics, provide a structure that helps progress the level of cybersecurity that targets and adapts enterprise IT security mechanisms. Our endpoint protection encompasses forensics, prevention, visibility, and remediation, offering advanced protection against advanced targeted attacks.|
|wolfSSL, founded in 2004, is an open source Internet security company whose primary products include the CyaSSL lightweight SSL library and the yaSSL Embedded Web Server. Primary users are programmers building security functionality into their applications and devices. wolfSSL employs the dual licensing model, like MySQL, offering products under the GPLv2 as well as a standard commercial license.|
|wolfSSL's products are designed to offer optimal performance, rapid integration, the ability to leverage hardware crypto, and support for the most current standards. All products are designed with clean APIs, and are backed by a dedicated and responsive support and development team.|
|With global operations, Wontok, Inc. (booth # 2502) delivers proven data security solutions that fill the gaps left by conventional security offerings. Wontok's added layer of security provides businesses, government organizations and consumers the confidence that their online commerce and communications are secure and their data is safe. During The RSA Conference February 24-28th, Wontok announces two new malware prevention products targeted for Retailers and Banks adding on its flagship product, Wontok™ SafeCentral, a proven endpoint cybersecurity solution that renders malware inoperable even on already infected PCs running Windows. Please contact us to arrange an interview with Wontok's CEO, Adam Tegg.|
|Zscaler is transforming enterprise networking and security with the world’s largest Direct-to-Cloud Network, which securely enables the productivity benefits of cloud, mobile and social technologies without the cost and complexity of traditional on-premise appliances and software.|
|The Zscaler Direct-to-Cloud Network processes daily more than 12 billion transactions from more than 12 million users in 180 countries across 100 global data centers with near-zero latency. Learn why more than 4,500 global enterprises choose Zscaler to enable end-user productivity, enforce security policy and streamline WAN performance.|
About Business Wire
Business Wire, a Berkshire Hathaway company, is the global leader in press release distribution and regulatory disclosure. Investor relations, public relations, public policy and marketing professionals rely on Business Wire to accurately distribute market-moving news and multimedia, host online newsrooms and IR websites, build content marketing platforms, generate social engagements and provide audience analysis that improves interaction with specified target markets. Founded in 1961, Business Wire is a trusted source for news organizations, journalists, investment professionals and regulatory authorities, delivering news directly into editorial systems and leading online news sources via its multi-patented simultaneous NX Network. Business Wire has 32 offices worldwide to securely meet the varying needs of communications professionals and news consumers.
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Sep. 25, 2016 04:15 AM EDT Reads: 1,378
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Sep. 25, 2016 04:15 AM EDT Reads: 942
SYS-CON Events announced today that China Unicom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE F...
Sep. 25, 2016 04:15 AM EDT Reads: 1,677
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Sep. 25, 2016 03:15 AM EDT Reads: 3,341
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Sep. 25, 2016 03:00 AM EDT Reads: 1,444
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Sep. 25, 2016 02:45 AM EDT Reads: 1,696
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Sep. 25, 2016 02:15 AM EDT Reads: 1,204
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
Sep. 25, 2016 12:45 AM EDT Reads: 1,928
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Sep. 25, 2016 12:45 AM EDT Reads: 1,033
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
Sep. 24, 2016 09:45 PM EDT Reads: 1,606
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
Sep. 24, 2016 08:30 PM EDT Reads: 1,444
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Sep. 24, 2016 08:00 PM EDT Reads: 1,654
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Sep. 24, 2016 07:00 PM EDT Reads: 2,792
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Sep. 24, 2016 06:45 PM EDT Reads: 1,486
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 24, 2016 04:30 PM EDT Reads: 1,514
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Sep. 24, 2016 01:00 PM EDT Reads: 1,490
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Sep. 24, 2016 12:00 PM EDT Reads: 775
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
Sep. 24, 2016 12:00 PM EDT Reads: 781
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Sep. 24, 2016 11:45 AM EDT Reads: 1,045
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
Sep. 24, 2016 10:45 AM EDT Reads: 1,726